Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-5791 (GCVE-0-2025-5791)
Vulnerability from cvelistv5 – Published: 2025-06-06 13:10 – Updated: 2025-11-20 07:41- CWE-266 - Incorrect Privilege Assignment
| URL | Tags |
|---|---|
| https://access.redhat.com/errata/RHSA-2025:12359 | vendor-advisoryx_refsource_REDHAT |
| https://access.redhat.com/security/cve/CVE-2025-5791 | vdb-entryx_refsource_REDHAT |
| https://bugzilla.redhat.com/show_bug.cgi?id=2370001 | issue-trackingx_refsource_REDHAT |
| https://crates.io/crates/users | |
| https://github.com/ogham/rust-users/issues/44 | |
| https://rustsec.org/advisories/RUSTSEC-2025-0040.html |
| Vendor | Product | Version | |
|---|---|---|---|
|
Affected:
0.8.0 , < 0.11.1
(semver)
|
|||
| Red Hat | Red Hat OpenShift sandboxed containers 1.1 |
Unaffected:
sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba , < *
(rpm)
cpe:/a:redhat:confidential_compute_attestation:1.10::el9 |
|
| Red Hat | Red Hat Enterprise Linux 10 |
cpe:/o:redhat:enterprise_linux:10 |
|
| Red Hat | Red Hat Enterprise Linux 9 |
cpe:/o:redhat:enterprise_linux:9 |
|
| Red Hat | Red Hat OpenShift Container Platform 4 |
cpe:/a:redhat:openshift:4 |
|
| Red Hat | Red Hat OpenShift Container Platform 4 |
cpe:/a:redhat:openshift:4 |
|
| Red Hat | Red Hat Trusted Profile Analyzer |
cpe:/a:redhat:trusted_profile_analyzer:1 |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-5791",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-06-06T13:40:43.009202Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-06-06T13:40:47.773Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://github.com/ogham/rust-users/",
"defaultStatus": "unaffected",
"packageName": "rust-users",
"versions": [
{
"lessThan": "0.11.1",
"status": "affected",
"version": "0.8.0",
"versionType": "semver"
}
]
},
{
"collectionURL": "https://catalog.redhat.com/software/containers/",
"cpes": [
"cpe:/a:redhat:confidential_compute_attestation:1.10::el9"
],
"defaultStatus": "affected",
"packageName": "openshift-sandboxed-containers/osc-rhel9-operator",
"product": "Red Hat OpenShift sandboxed containers 1.1",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:10"
],
"defaultStatus": "affected",
"packageName": "rust-ssh-key-dir",
"product": "Red Hat Enterprise Linux 10",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "affected",
"packageName": "rust-afterburn",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "unaffected",
"packageName": "kata-containers",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:openshift:4"
],
"defaultStatus": "affected",
"packageName": "rust-afterburn",
"product": "Red Hat OpenShift Container Platform 4",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:trusted_profile_analyzer:1"
],
"defaultStatus": "affected",
"packageName": "rhtpa/rhtpa-trustification-service-rhel9",
"product": "Red Hat Trusted Profile Analyzer",
"vendor": "Red Hat"
}
],
"datePublic": "2025-01-15T12:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Important"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-266",
"description": "Incorrect Privilege Assignment",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-20T07:41:09.666Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2025:12359",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2025:12359"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2025-5791"
},
{
"name": "RHBZ#2370001",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370001"
},
{
"url": "https://crates.io/crates/users"
},
{
"url": "https://github.com/ogham/rust-users/issues/44"
},
{
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html"
}
],
"timeline": [
{
"lang": "en",
"time": "2025-06-03T13:02:24.781Z",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2025-01-15T12:00:00.000Z",
"value": "Made public."
}
],
"title": "Users: `root` appended to group listings",
"x_redhatCweChain": "CWE-266: Incorrect Privilege Assignment"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2025-5791",
"datePublished": "2025-06-06T13:10:07.157Z",
"dateReserved": "2025-06-06T08:09:10.242Z",
"dateUpdated": "2025-11-20T07:41:09.666Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-5791",
"date": "2026-05-20",
"epss": "0.0003",
"percentile": "0.088"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-5791\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2025-06-06T14:15:23.137\",\"lastModified\":\"2025-07-31T16:15:31.793\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla en el crate del usuario para Rust. Esta vulnerabilidad permite la escalada de privilegios mediante una lista de grupos incorrecta cuando un usuario o proceso tiene menos de exactamente 1024 grupos, lo que provoca la inclusi\u00f3n err\u00f3nea del grupo ra\u00edz en la lista de acceso.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-266\"}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2025:12359\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2025-5791\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2370001\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://crates.io/crates/users\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://github.com/ogham/rust-users/issues/44\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://rustsec.org/advisories/RUSTSEC-2025-0040.html\",\"source\":\"secalert@redhat.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-5791\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-06T13:40:43.009202Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-06T13:40:44.958Z\"}}], \"cna\": {\"title\": \"Users: `root` appended to group listings\", \"metrics\": [{\"other\": {\"type\": \"Red Hat severity rating\", \"content\": {\"value\": \"Important\", \"namespace\": \"https://access.redhat.com/security/updates/classification/\"}}}, {\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"NONE\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"versions\": [{\"status\": \"affected\", \"version\": \"0.8.0\", \"lessThan\": \"0.11.1\", \"versionType\": \"semver\"}], \"packageName\": \"rust-users\", \"collectionURL\": \"https://github.com/ogham/rust-users/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:confidential_compute_attestation:1.10::el9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift sandboxed containers 1.1\", \"versions\": [{\"status\": \"unaffected\", \"version\": \"sha256:a6f29da891174e57fcfd131da7aa90c50459ba24164111b83120a1b91f2eabba\", \"lessThan\": \"*\", \"versionType\": \"rpm\"}], \"packageName\": \"openshift-sandboxed-containers/osc-rhel9-operator\", \"collectionURL\": \"https://catalog.redhat.com/software/containers/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:10\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 10\", \"packageName\": \"rust-ssh-key-dir\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/o:redhat:enterprise_linux:9\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Enterprise Linux 9\", \"packageName\": \"rust-afterburn\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"kata-containers\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:/a:redhat:openshift:4\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat OpenShift Container Platform 4\", \"packageName\": \"rust-afterburn\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}, {\"cpes\": [\"cpe:/a:redhat:trusted_profile_analyzer:1\"], \"vendor\": \"Red Hat\", \"product\": \"Red Hat Trusted Profile Analyzer\", \"packageName\": \"rhtpa/rhtpa-trustification-service-rhel9\", \"collectionURL\": \"https://access.redhat.com/downloads/content/package-browser/\", \"defaultStatus\": \"affected\"}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-03T13:02:24.781Z\", \"value\": \"Reported to Red Hat.\"}, {\"lang\": \"en\", \"time\": \"2025-01-15T12:00:00.000Z\", \"value\": \"Made public.\"}], \"datePublic\": \"2025-01-15T12:00:00.000Z\", \"references\": [{\"url\": \"https://access.redhat.com/errata/RHSA-2025:12359\", \"name\": \"RHSA-2025:12359\", \"tags\": [\"vendor-advisory\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2025-5791\", \"tags\": [\"vdb-entry\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2370001\", \"name\": \"RHBZ#2370001\", \"tags\": [\"issue-tracking\", \"x_refsource_REDHAT\"]}, {\"url\": \"https://crates.io/crates/users\"}, {\"url\": \"https://github.com/ogham/rust-users/issues/44\"}, {\"url\": \"https://rustsec.org/advisories/RUSTSEC-2025-0040.html\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-266\", \"description\": \"Incorrect Privilege Assignment\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2025-11-20T07:41:09.666Z\"}, \"x_redhatCweChain\": \"CWE-266: Incorrect Privilege Assignment\"}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-5791\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-20T07:41:09.666Z\", \"dateReserved\": \"2025-06-06T08:09:10.242Z\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2025-06-06T13:10:07.157Z\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
BDU:2025-10734
Vulnerability from fstec - Published: 15.01.2025{
"CVSS 2.0": "AV:L/AC:L/Au:S/C:C/I:C/A:N",
"CVSS 3.0": "AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Red Hat Inc., The Rust Foundation",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "4 (Red Hat OpenShift Container Platform), 9 (Red Hat Enterprise Linux), 10 (Red Hat Enterprise Linux), \u0434\u043e 0.8.0 (Rust), - (Red Hat Trusted Profile Analyzer)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://rustsec.org/advisories/RUSTSEC-2025-0040.html\n\n\u0414\u043b\u044f \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u044b\u0445 \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u043e\u0432 Red Hat Inc.:\nhttps://access.redhat.com/security/cve/CVE-2025-5791\n\n\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0430\u0446\u0438\u044f \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439;\n- \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435/\u0443\u0434\u0430\u043b\u0435\u043d\u0438\u0435 \u043d\u0435\u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u044b\u0445 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0437\u0430\u043f\u0438\u0441\u0435\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 \u0430\u0443\u0434\u0438\u0442\u0430 \u043a\u043b\u0430\u0441\u0442\u0435\u0440\u0430 \u0434\u043b\u044f \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u043d\u0438\u044f \u043f\u043e\u043f\u044b\u0442\u043e\u043a \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.09.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.09.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-10734",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-5791",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Red Hat OpenShift Container Platform, Red Hat Enterprise Linux, Rust, Red Hat Trusted Profile Analyzer",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Red Hat Inc. Red Hat Enterprise Linux 9 , Red Hat Inc. Red Hat Enterprise Linux 10 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Rust, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043f\u0440\u0438\u0441\u0432\u0430\u0438\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u043e\u0435 \u043f\u0440\u0438\u0441\u0432\u0430\u0438\u0432\u0430\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439 (CWE-266)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u044f\u0437\u044b\u043a\u0430 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Rust \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u044b\u043c \u043f\u0440\u0438\u0441\u0432\u0430\u0438\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html\nhttps://access.redhat.com/security/cve/CVE-2025-5791\nhttps://github.com/ogham/rust-users/issues/44",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-266",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,2)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.1 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
FKIE_CVE-2025-5791
Vulnerability from fkie_nvd - Published: 2025-06-06 14:15 - Updated: 2026-04-15 00:35| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla en el crate del usuario para Rust. Esta vulnerabilidad permite la escalada de privilegios mediante una lista de grupos incorrecta cuando un usuario o proceso tiene menos de exactamente 1024 grupos, lo que provoca la inclusi\u00f3n err\u00f3nea del grupo ra\u00edz en la lista de acceso."
}
],
"id": "CVE-2025-5791",
"lastModified": "2026-04-15T00:35:42.020",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 5.2,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2025-06-06T14:15:23.137",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2025:12359"
},
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/security/cve/CVE-2025-5791"
},
{
"source": "secalert@redhat.com",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370001"
},
{
"source": "secalert@redhat.com",
"url": "https://crates.io/crates/users"
},
{
"source": "secalert@redhat.com",
"url": "https://github.com/ogham/rust-users/issues/44"
},
{
"source": "secalert@redhat.com",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-266"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
GHSA-JQ8X-V7JW-V675
Vulnerability from github – Published: 2025-06-06 15:30 – Updated: 2025-07-31 18:31Duplicate Advisory
This advisory has been withdrawn because it is a duplicate of GHSA-m65q-v92h-cm7q. This link is maintained to preserve external references.
Original Description
A flaw was found in the user's crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "users"
},
"ranges": [
{
"events": [
{
"introduced": "0.8.0"
},
{
"last_affected": "0.11.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [],
"database_specific": {
"cwe_ids": [
"CWE-266"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-06T23:16:21Z",
"nvd_published_at": "2025-06-06T14:15:23Z",
"severity": "HIGH"
},
"details": "### Duplicate Advisory\nThis advisory has been withdrawn because it is a duplicate of GHSA-m65q-v92h-cm7q. This link is maintained to preserve external references.\n\n### Original Description\nA flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.",
"id": "GHSA-jq8x-v7jw-v675",
"modified": "2025-07-31T18:31:57Z",
"published": "2025-06-06T15:30:53Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5791"
},
{
"type": "WEB",
"url": "https://github.com/ogham/rust-users/issues/44"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2025:12359"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-5791"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370001"
},
{
"type": "WEB",
"url": "https://crates.io/crates/users"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "Duplicate Advisory: users may append `root` to group listings",
"withdrawn": "2025-06-06T23:16:21Z"
}
GHSA-M65Q-V92H-CM7Q
Vulnerability from github – Published: 2025-06-05 01:17 – Updated: 2025-06-06 23:16Affected versions append root to group listings, unless the correct listing has exactly 1024 groups.
This affects both:
- The supplementary groups of a user
- The group access list of the current process
If the caller uses this information for access control, this may lead to privilege escalation.
This crate is not currently maintained, so a patched version is not available.
Versions older than 0.8.0 do not contain the affected functions, so downgrading to them is a workaround.
Recommended alternatives
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "users"
},
"ranges": [
{
"events": [
{
"introduced": "0.8.0"
},
{
"last_affected": "0.11.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-5791"
],
"database_specific": {
"cwe_ids": [
"CWE-266"
],
"github_reviewed": true,
"github_reviewed_at": "2025-06-05T01:17:28Z",
"nvd_published_at": null,
"severity": "HIGH"
},
"details": "Affected versions append `root` to group listings, unless the correct listing has exactly 1024 groups.\n\nThis affects both:\n\n- The supplementary groups of a user\n- The group access list of the current process\n\nIf the caller uses this information for access control, this may lead to privilege escalation.\n\nThis crate is not currently maintained, so a patched version is not available.\n\nVersions older than 0.8.0 do not contain the affected functions, so downgrading to them is a workaround.\n\n## Recommended alternatives\n- [`uzers`](https://crates.io/crates/uzers) (an actively maintained fork of the `users` crate)\n- [`sysinfo`](https://crates.io/crates/sysinfo)",
"id": "GHSA-m65q-v92h-cm7q",
"modified": "2025-06-06T23:16:38Z",
"published": "2025-06-05T01:17:28Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-5791"
},
{
"type": "WEB",
"url": "https://github.com/ogham/rust-users/issues/44"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2025-5791"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2370001"
},
{
"type": "PACKAGE",
"url": "https://github.com/ogham/rust-users"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0040.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"type": "CVSS_V3"
}
],
"summary": "users may append `root` to group listings"
}
MSRC_CVE-2025-5791
Vulnerability from csaf_microsoft - Published: 2025-06-02 00:00 - Updated: 2026-04-29 14:56| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 20126-17086 | — |
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17084-6 | — |
None Available
|
|
| Unresolved product id: 17084-5 | — |
None Available
|
|
| Unresolved product id: 17084-4 | — |
None Available
|
|
| Unresolved product id: 17084-3 | — |
None Available
|
|
| Unresolved product id: 17084-1 | — |
None Available
|
|
| Unresolved product id: 17086-7 | — |
Vendor Fix
fix
|
|
| Unresolved product id: 17084-2 | — |
None Available
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: 17086-9 | — | ||
| Unresolved product id: 17084-8 | — |
| URL | Category |
|---|---|
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
| https://support.microsoft.com/lifecycle | external |
| https://www.first.org/cvss | external |
| https://msrc.microsoft.com/csaf/vex/2025/msrc_cve… | self |
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5791 Users: `root` appended to group listings - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-5791.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Users: `root` appended to group listings",
"tracking": {
"current_release_date": "2026-04-29T14:56:26.000Z",
"generator": {
"date": "2026-04-30T11:50:22.088Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-5791",
"initial_release_date": "2025-06-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-08-06T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-01-20T14:50:51.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2026-02-18T14:47:20.000Z",
"legacy_version": "2.1",
"number": "3",
"summary": "Information published."
},
{
"date": "2026-03-04T14:45:28.000Z",
"legacy_version": "3",
"number": "4",
"summary": "Information published."
},
{
"date": "2026-03-31T15:18:51.000Z",
"legacy_version": "4",
"number": "5",
"summary": "Information published."
},
{
"date": "2026-04-29T14:56:26.000Z",
"legacy_version": "5",
"number": "6",
"summary": "Information published."
}
],
"status": "final",
"version": "6"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-4.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-4.azl3",
"product_id": "6"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-5.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-5.azl3",
"product_id": "5"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-6.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-6.azl3",
"product_id": "4"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-7.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-7.azl3",
"product_id": "3"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3",
"product_id": "1"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2",
"product": {
"name": "\u003ccbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2",
"product": {
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2",
"product_id": "20126"
}
},
{
"category": "product_version_range",
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-8.azl3",
"product": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-8.azl3",
"product_id": "2"
}
}
],
"category": "product_name",
"name": "kata-containers-cc"
},
{
"category": "product_name",
"name": "cbl2 kata-containers 0:3.2.0.azl2-6.cbl2",
"product": {
"name": "cbl2 kata-containers 0:3.2.0.azl2-6.cbl2",
"product_id": "9"
}
},
{
"category": "product_name",
"name": "azl3 kata-containers 0:3.15.0.aks0-1.azl3",
"product": {
"name": "azl3 kata-containers 0:3.15.0.aks0-1.azl3",
"product_id": "8"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-4.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-6"
},
"product_reference": "6",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kata-containers 0:3.2.0.azl2-6.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-5.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-6.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-7.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-9.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers 0:3.15.0.aks0-1.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2 as a component of CBL Mariner 2.0",
"product_id": "17086-7"
},
"product_reference": "7",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kata-containers-cc 0:3.2.0.azl2-7.cbl2 as a component of CBL Mariner 2.0",
"product_id": "20126-17086"
},
"product_reference": "20126",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kata-containers-cc 0:3.15.0.aks0-8.azl3 as a component of Azure Linux 3.0",
"product_id": "17084-2"
},
"product_reference": "2",
"relates_to_product_reference": "17084"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5791",
"cwe": {
"id": "CWE-266",
"name": "Incorrect Privilege Assignment"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-9",
"17084-8"
]
}
],
"notes": [
{
"category": "general",
"text": "redhat",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20126-17086"
],
"known_affected": [
"17084-6",
"17084-5",
"17084-4",
"17084-3",
"17084-1",
"17086-7",
"17084-2"
],
"known_not_affected": [
"17086-9",
"17084-8"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-5791 Users: `root` appended to group listings - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-5791.json"
}
],
"remediations": [
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-6"
]
},
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-5"
]
},
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-4"
]
},
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-3"
]
},
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-1"
]
},
{
"category": "none_available",
"date": "2025-08-06T00:00:00.000Z",
"details": "There is no fix available for this vulnerability as of now",
"product_ids": [
"17084-2"
]
},
{
"category": "vendor_fix",
"date": "2025-08-06T00:00:00.000Z",
"details": "0:3.2.0.azl2-7.cbl2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalsScore": 0.0,
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.1,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"17084-6",
"17084-5",
"17084-4",
"17084-3",
"17084-1",
"17086-7",
"17084-2"
]
}
],
"title": "Users: `root` appended to group listings"
}
]
}
OPENSUSE-SU-2025:15217-1
Vulnerability from csaf_opensuse - Published: 2025-07-03 00:00 - Updated: 2025-07-03 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "flake-pilot-3.1.19-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the flake-pilot-3.1.19-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15217",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15217-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5791/"
}
],
"title": "flake-pilot-3.1.19-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15217-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.19-1.1.aarch64",
"product": {
"name": "flake-pilot-3.1.19-1.1.aarch64",
"product_id": "flake-pilot-3.1.19-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.19-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-3.1.19-1.1.aarch64",
"product_id": "flake-pilot-firecracker-3.1.19-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.19-1.1.aarch64",
"product": {
"name": "flake-pilot-podman-3.1.19-1.1.aarch64",
"product_id": "flake-pilot-podman-3.1.19-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.19-1.1.ppc64le",
"product": {
"name": "flake-pilot-3.1.19-1.1.ppc64le",
"product_id": "flake-pilot-3.1.19-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-3.1.19-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.19-1.1.ppc64le",
"product": {
"name": "flake-pilot-podman-3.1.19-1.1.ppc64le",
"product_id": "flake-pilot-podman-3.1.19-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.19-1.1.s390x",
"product": {
"name": "flake-pilot-3.1.19-1.1.s390x",
"product_id": "flake-pilot-3.1.19-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.19-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-3.1.19-1.1.s390x",
"product_id": "flake-pilot-firecracker-3.1.19-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.19-1.1.s390x",
"product": {
"name": "flake-pilot-podman-3.1.19-1.1.s390x",
"product_id": "flake-pilot-podman-3.1.19-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.19-1.1.x86_64",
"product": {
"name": "flake-pilot-3.1.19-1.1.x86_64",
"product_id": "flake-pilot-3.1.19-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.19-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-3.1.19-1.1.x86_64",
"product_id": "flake-pilot-firecracker-3.1.19-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.19-1.1.x86_64",
"product": {
"name": "flake-pilot-podman-3.1.19-1.1.x86_64",
"product_id": "flake-pilot-podman-3.1.19-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.19-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64"
},
"product_reference": "flake-pilot-3.1.19-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.19-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le"
},
"product_reference": "flake-pilot-3.1.19-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.19-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x"
},
"product_reference": "flake-pilot-3.1.19-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.19-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64"
},
"product_reference": "flake-pilot-3.1.19-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.19-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-3.1.19-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.19-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.19-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-3.1.19-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.19-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-3.1.19-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.19-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64"
},
"product_reference": "flake-pilot-podman-3.1.19-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.19-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le"
},
"product_reference": "flake-pilot-podman-3.1.19-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.19-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x"
},
"product_reference": "flake-pilot-podman-3.1.19-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.19-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
},
"product_reference": "flake-pilot-podman-3.1.19-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3416"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in OpenSSL\u0027s handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3416",
"url": "https://www.suse.com/security/cve/CVE-2025-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1242599 for CVE-2025-3416",
"url": "https://bugzilla.suse.com/1242599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-3416"
},
{
"cve": "CVE-2025-5791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5791"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5791",
"url": "https://www.suse.com/security/cve/CVE-2025-5791"
},
{
"category": "external",
"summary": "SUSE Bug 1244187 for CVE-2025-5791",
"url": "https://bugzilla.suse.com/1244187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.19-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.19-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5791"
}
]
}
OPENSUSE-SU-2025:15246-1
Vulnerability from csaf_opensuse - Published: 2025-07-03 00:00 - Updated: 2025-07-03 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "mirrorsorcerer-0.1.3~1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the mirrorsorcerer-0.1.3~1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15246",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15246-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5791/"
}
],
"title": "mirrorsorcerer-0.1.3~1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15246-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "mirrorsorcerer-0.1.3~1-1.1.aarch64",
"product": {
"name": "mirrorsorcerer-0.1.3~1-1.1.aarch64",
"product_id": "mirrorsorcerer-0.1.3~1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"product": {
"name": "mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"product_id": "mirrorsorcerer-0.1.3~1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "mirrorsorcerer-0.1.3~1-1.1.s390x",
"product": {
"name": "mirrorsorcerer-0.1.3~1-1.1.s390x",
"product_id": "mirrorsorcerer-0.1.3~1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "mirrorsorcerer-0.1.3~1-1.1.x86_64",
"product": {
"name": "mirrorsorcerer-0.1.3~1-1.1.x86_64",
"product_id": "mirrorsorcerer-0.1.3~1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "mirrorsorcerer-0.1.3~1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.aarch64"
},
"product_reference": "mirrorsorcerer-0.1.3~1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mirrorsorcerer-0.1.3~1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.ppc64le"
},
"product_reference": "mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mirrorsorcerer-0.1.3~1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.s390x"
},
"product_reference": "mirrorsorcerer-0.1.3~1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "mirrorsorcerer-0.1.3~1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.x86_64"
},
"product_reference": "mirrorsorcerer-0.1.3~1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5791"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.aarch64",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.s390x",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5791",
"url": "https://www.suse.com/security/cve/CVE-2025-5791"
},
{
"category": "external",
"summary": "SUSE Bug 1244187 for CVE-2025-5791",
"url": "https://bugzilla.suse.com/1244187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.aarch64",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.s390x",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.aarch64",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.ppc64le",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.s390x",
"openSUSE Tumbleweed:mirrorsorcerer-0.1.3~1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5791"
}
]
}
OPENSUSE-SU-2025:15335-1
Vulnerability from csaf_opensuse - Published: 2025-07-11 00:00 - Updated: 2025-07-11 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:afterburn-5.8.2-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-5.8.2-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-5.8.2-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-5.8.2-3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "afterburn-5.8.2-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the afterburn-5.8.2-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15335",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15335-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5791/"
}
],
"title": "afterburn-5.8.2-3.1 on GA media",
"tracking": {
"current_release_date": "2025-07-11T00:00:00Z",
"generator": {
"date": "2025-07-11T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15335-1",
"initial_release_date": "2025-07-11T00:00:00Z",
"revision_history": [
{
"date": "2025-07-11T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-3.1.aarch64",
"product": {
"name": "afterburn-5.8.2-3.1.aarch64",
"product_id": "afterburn-5.8.2-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.8.2-3.1.aarch64",
"product": {
"name": "afterburn-dracut-5.8.2-3.1.aarch64",
"product_id": "afterburn-dracut-5.8.2-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-3.1.ppc64le",
"product": {
"name": "afterburn-5.8.2-3.1.ppc64le",
"product_id": "afterburn-5.8.2-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.8.2-3.1.ppc64le",
"product": {
"name": "afterburn-dracut-5.8.2-3.1.ppc64le",
"product_id": "afterburn-dracut-5.8.2-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-3.1.s390x",
"product": {
"name": "afterburn-5.8.2-3.1.s390x",
"product_id": "afterburn-5.8.2-3.1.s390x"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.8.2-3.1.s390x",
"product": {
"name": "afterburn-dracut-5.8.2-3.1.s390x",
"product_id": "afterburn-dracut-5.8.2-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-3.1.x86_64",
"product": {
"name": "afterburn-5.8.2-3.1.x86_64",
"product_id": "afterburn-5.8.2-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "afterburn-dracut-5.8.2-3.1.x86_64",
"product": {
"name": "afterburn-dracut-5.8.2-3.1.x86_64",
"product_id": "afterburn-dracut-5.8.2-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.8.2-3.1.aarch64"
},
"product_reference": "afterburn-5.8.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.8.2-3.1.ppc64le"
},
"product_reference": "afterburn-5.8.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.8.2-3.1.s390x"
},
"product_reference": "afterburn-5.8.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-5.8.2-3.1.x86_64"
},
"product_reference": "afterburn-5.8.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.8.2-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.aarch64"
},
"product_reference": "afterburn-dracut-5.8.2-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.8.2-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.ppc64le"
},
"product_reference": "afterburn-dracut-5.8.2-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.8.2-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.s390x"
},
"product_reference": "afterburn-dracut-5.8.2-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.8.2-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.x86_64"
},
"product_reference": "afterburn-dracut-5.8.2-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5791"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5791",
"url": "https://www.suse.com/security/cve/CVE-2025-5791"
},
{
"category": "external",
"summary": "SUSE Bug 1244187 for CVE-2025-5791",
"url": "https://bugzilla.suse.com/1244187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-5.8.2-3.1.x86_64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.aarch64",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.ppc64le",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.s390x",
"openSUSE Tumbleweed:afterburn-dracut-5.8.2-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5791"
}
]
}
OPENSUSE-SU-2025:15412-1
Vulnerability from csaf_opensuse - Published: 2025-08-06 00:00 - Updated: 2025-08-06 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "agama-17+60.68fdb92ec-26.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the agama-17+60.68fdb92ec-26.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15412",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15412-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5791/"
}
],
"title": "agama-17+60.68fdb92ec-26.1 on GA media",
"tracking": {
"current_release_date": "2025-08-06T00:00:00Z",
"generator": {
"date": "2025-08-06T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15412-1",
"initial_release_date": "2025-08-06T00:00:00Z",
"revision_history": [
{
"date": "2025-08-06T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "agama-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-autoinstall-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-cli-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-cli-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-cli-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-openapi-17+60.68fdb92ec-26.1.aarch64"
}
},
{
"category": "product_version",
"name": "agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"product": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"product_id": "agama-scripts-17+60.68fdb92ec-26.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "agama-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-cli-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-openapi-17+60.68fdb92ec-26.1.ppc64le"
}
},
{
"category": "product_version",
"name": "agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"product": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"product_id": "agama-scripts-17+60.68fdb92ec-26.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "agama-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-autoinstall-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-cli-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-cli-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-cli-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-openapi-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-openapi-17+60.68fdb92ec-26.1.s390x"
}
},
{
"category": "product_version",
"name": "agama-scripts-17+60.68fdb92ec-26.1.s390x",
"product": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.s390x",
"product_id": "agama-scripts-17+60.68fdb92ec-26.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "agama-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-autoinstall-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-cli-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-cli-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-cli-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-openapi-17+60.68fdb92ec-26.1.x86_64"
}
},
{
"category": "product_version",
"name": "agama-scripts-17+60.68fdb92ec-26.1.x86_64",
"product": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.x86_64",
"product_id": "agama-scripts-17+60.68fdb92ec-26.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-autoinstall-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-cli-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-cli-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-cli-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-openapi-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-openapi-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.aarch64"
},
"product_reference": "agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.ppc64le"
},
"product_reference": "agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.s390x"
},
"product_reference": "agama-scripts-17+60.68fdb92ec-26.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "agama-scripts-17+60.68fdb92ec-26.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.x86_64"
},
"product_reference": "agama-scripts-17+60.68fdb92ec-26.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5791"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5791",
"url": "https://www.suse.com/security/cve/CVE-2025-5791"
},
{
"category": "external",
"summary": "SUSE Bug 1244187 for CVE-2025-5791",
"url": "https://bugzilla.suse.com/1244187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-autoinstall-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-bash-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-fish-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-cli-zsh-completion-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-openapi-17+60.68fdb92ec-26.1.x86_64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.aarch64",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.ppc64le",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.s390x",
"openSUSE Tumbleweed:agama-scripts-17+60.68fdb92ec-26.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-06T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5791"
}
]
}
OPENSUSE-SU-2025:15628-1
Vulnerability from csaf_opensuse - Published: 2025-10-13 00:00 - Updated: 2025-10-13 00:00| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Tumbleweed:lsd-1.2.0-1.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:lsd-1.2.0-1.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:lsd-1.2.0-1.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Tumbleweed:lsd-1.2.0-1.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "lsd-1.2.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the lsd-1.2.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15628",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15628-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-5791 page",
"url": "https://www.suse.com/security/cve/CVE-2025-5791/"
}
],
"title": "lsd-1.2.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-10-13T00:00:00Z",
"generator": {
"date": "2025-10-13T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15628-1",
"initial_release_date": "2025-10-13T00:00:00Z",
"revision_history": [
{
"date": "2025-10-13T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "lsd-1.2.0-1.1.aarch64",
"product": {
"name": "lsd-1.2.0-1.1.aarch64",
"product_id": "lsd-1.2.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "lsd-1.2.0-1.1.ppc64le",
"product": {
"name": "lsd-1.2.0-1.1.ppc64le",
"product_id": "lsd-1.2.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "lsd-1.2.0-1.1.s390x",
"product": {
"name": "lsd-1.2.0-1.1.s390x",
"product_id": "lsd-1.2.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "lsd-1.2.0-1.1.x86_64",
"product": {
"name": "lsd-1.2.0-1.1.x86_64",
"product_id": "lsd-1.2.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "lsd-1.2.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lsd-1.2.0-1.1.aarch64"
},
"product_reference": "lsd-1.2.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lsd-1.2.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lsd-1.2.0-1.1.ppc64le"
},
"product_reference": "lsd-1.2.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lsd-1.2.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lsd-1.2.0-1.1.s390x"
},
"product_reference": "lsd-1.2.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "lsd-1.2.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:lsd-1.2.0-1.1.x86_64"
},
"product_reference": "lsd-1.2.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-5791",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-5791"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in the user\u0027s crate for Rust. This vulnerability allows privilege escalation via incorrect group listing when a user or process has fewer than exactly 1024 groups, leading to the erroneous inclusion of the root group in the access list.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:lsd-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-5791",
"url": "https://www.suse.com/security/cve/CVE-2025-5791"
},
{
"category": "external",
"summary": "SUSE Bug 1244187 for CVE-2025-5791",
"url": "https://bugzilla.suse.com/1244187"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:lsd-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:lsd-1.2.0-1.1.aarch64",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.ppc64le",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.s390x",
"openSUSE Tumbleweed:lsd-1.2.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-13T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-5791"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.