Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-26625 (GCVE-0-2025-26625)
Vulnerability from cvelistv5
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-26625",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-10-17T15:44:04.948544Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-17T15:44:38.795Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "git-lfs",
"vendor": "git-lfs",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.5.2, \u003c 3.7.1"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-59",
"description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-17T15:30:14.630Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5"
},
{
"name": "https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396"
},
{
"name": "https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8"
},
{
"name": "https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615"
},
{
"name": "https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1"
}
],
"source": {
"advisory": "GHSA-6pvw-g552-53c5",
"discovery": "UNKNOWN"
},
"title": "Git LFS may write to arbitrary files via crafted symlinks"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-26625",
"datePublished": "2025-10-17T15:30:14.630Z",
"dateReserved": "2025-02-12T14:51:02.719Z",
"dateUpdated": "2025-10-17T15:44:38.795Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-26625\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-10-17T16:15:37.260\",\"lastModified\":\"2025-10-21T19:31:50.020\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":8.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"PASSIVE\",\"vulnConfidentialityImpact\":\"HIGH\",\"vulnIntegrityImpact\":\"HIGH\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"references\":[{\"url\":\"https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-26625\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-10-17T15:44:04.948544Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-10-17T15:44:09.961Z\"}}], \"cna\": {\"title\": \"Git LFS may write to arbitrary files via crafted symlinks\", \"source\": {\"advisory\": \"GHSA-6pvw-g552-53c5\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 8.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N\", \"userInteraction\": \"PASSIVE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"HIGH\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"git-lfs\", \"product\": \"git-lfs\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 0.5.2, \u003c 3.7.1\"}]}], \"references\": [{\"url\": \"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5\", \"name\": \"https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396\", \"name\": \"https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8\", \"name\": \"https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615\", \"name\": \"https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1\", \"name\": \"https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-59\", \"description\": \"CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-10-17T15:30:14.630Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-26625\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-17T15:44:38.795Z\", \"dateReserved\": \"2025-02-12T14:51:02.719Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-10-17T15:30:14.630Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
opensuse-su-2025:15710-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20251105T184115-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15710",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15710-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11063 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11063/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11066 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11066/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11067 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11067/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11068 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11068/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11069 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11069/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11070 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11070/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11071 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11071/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11072 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11072/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11073 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11074 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11074/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11075 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11076 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11076/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11077 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11077/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11078 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11078/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11079 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11079/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11080 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11080/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11081 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11081/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11082 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11082/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11083 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11083/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2016-11084 page",
"url": "https://www.suse.com/security/cve/CVE-2016-11084/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2017-18872 page",
"url": "https://www.suse.com/security/cve/CVE-2017-18872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32199 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32199/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-58269 page",
"url": "https://www.suse.com/security/cve/CVE-2024-58269/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10545 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10545/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10678 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10678/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-10954 page",
"url": "https://www.suse.com/security/cve/CVE-2025-10954/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11374 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11374/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11375 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11579 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11579/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-11621 page",
"url": "https://www.suse.com/security/cve/CVE-2025-11621/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-12044 page",
"url": "https://www.suse.com/security/cve/CVE-2025-12044/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-26625 page",
"url": "https://www.suse.com/security/cve/CVE-2025-26625/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27093 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27093/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-41410 page",
"url": "https://www.suse.com/security/cve/CVE-2025-41410/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-41443 page",
"url": "https://www.suse.com/security/cve/CVE-2025-41443/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54286 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54286/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54287 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54287/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54288 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54289 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54289/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54290 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54290/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54291 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54291/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54293/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54469 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54469/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54470 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54470/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54471 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54471/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-54499 page",
"url": "https://www.suse.com/security/cve/CVE-2025-54499/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58073 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58073/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58075 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58075/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-58356 page",
"url": "https://www.suse.com/security/cve/CVE-2025-58356/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59043 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59043/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59048 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59048/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59530 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59530/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59836 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-59937 page",
"url": "https://www.suse.com/security/cve/CVE-2025-59937/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61141 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61141/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61524 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61524/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61581 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61581/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-61688 page",
"url": "https://www.suse.com/security/cve/CVE-2025-61688/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62156 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62156/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62157 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62157/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62375 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62375/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62513 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62513/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62705 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62705/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62714 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62725 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62725/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-62820 page",
"url": "https://www.suse.com/security/cve/CVE-2025-62820/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64101 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64101/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64102 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64102/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64103 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64103/"
}
],
"title": "govulncheck-vulndb-0.0.20251105T184115-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-07T00:00:00Z",
"generator": {
"date": "2025-11-07T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15710-1",
"initial_release_date": "2025-11-07T00:00:00Z",
"revision_history": [
{
"date": "2025-11-07T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20251105T184115-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-11063",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11063"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.5.1. XSS can occur via file preview.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11063",
"url": "https://www.suse.com/security/cve/CVE-2016-11063"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11063"
},
{
"cve": "CVE-2016-11066",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11066"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.2.0. The initial_load API disclosed unnecessary personal information.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11066",
"url": "https://www.suse.com/security/cve/CVE-2016-11066"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11066"
},
{
"cve": "CVE-2016-11067",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11067"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.2.0. It allowed crafted posts that could cause a web browser to hang.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11067",
"url": "https://www.suse.com/security/cve/CVE-2016-11067"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11067"
},
{
"cve": "CVE-2016-11068",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11068"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.2.0. Attackers could read LDAP fields via injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11068",
"url": "https://www.suse.com/security/cve/CVE-2016-11068"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11068"
},
{
"cve": "CVE-2016-11069",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11069"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.2.0. It mishandles brute-force attempts at password change.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11069",
"url": "https://www.suse.com/security/cve/CVE-2016-11069"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11069"
},
{
"cve": "CVE-2016-11070",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11070"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.1.0. It allows XSS via theme color-code values.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11070",
"url": "https://www.suse.com/security/cve/CVE-2016-11070"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2016-11070"
},
{
"cve": "CVE-2016-11071",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11071"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.1.0. It allows XSS because the noreferrer and noopener protection mechanisms were not in place.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11071",
"url": "https://www.suse.com/security/cve/CVE-2016-11071"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11071"
},
{
"cve": "CVE-2016-11072",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11072"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.2. The purposes of a session ID and a Session Token were mishandled.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11072",
"url": "https://www.suse.com/security/cve/CVE-2016-11072"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11072"
},
{
"cve": "CVE-2016-11073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11073"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a Legal or Support setting.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11073",
"url": "https://www.suse.com/security/cve/CVE-2016-11073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11073"
},
{
"cve": "CVE-2016-11074",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11074"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. A password-reset link could be reused.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11074",
"url": "https://www.suse.com/security/cve/CVE-2016-11074"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2016-11074"
},
{
"cve": "CVE-2016-11075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11075"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It allows attackers to obtain sensitive information about team URLs via an API.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11075",
"url": "https://www.suse.com/security/cve/CVE-2016-11075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11075"
},
{
"cve": "CVE-2016-11076",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11076"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It does not ensure that a cookie is used over SSL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11076",
"url": "https://www.suse.com/security/cve/CVE-2016-11076"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11076"
},
{
"cve": "CVE-2016-11077",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11077"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It has a superfluous API in which the System Admin can change the account name and e-mail address of an LDAP account.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11077",
"url": "https://www.suse.com/security/cve/CVE-2016-11077"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11077"
},
{
"cve": "CVE-2016-11078",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11078"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It potentially allows attackers to obtain sensitive information (credential fields within config.json) via the System Console UI.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11078",
"url": "https://www.suse.com/security/cve/CVE-2016-11078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11078"
},
{
"cve": "CVE-2016-11079",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11079"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It allows XSS via a redirect URL.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11079",
"url": "https://www.suse.com/security/cve/CVE-2016-11079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11079"
},
{
"cve": "CVE-2016-11080",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11080"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 3.0.0. It offers superfluous APIs for a Team Administrator to view account details.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11080",
"url": "https://www.suse.com/security/cve/CVE-2016-11080"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11080"
},
{
"cve": "CVE-2016-11081",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11081"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 2.2.0. It allows unintended access to information stored by a web browser.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11081",
"url": "https://www.suse.com/security/cve/CVE-2016-11081"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11081"
},
{
"cve": "CVE-2016-11082",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11082"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 2.2.0. It allows XSS via a crafted link.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11082",
"url": "https://www.suse.com/security/cve/CVE-2016-11082"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11082"
},
{
"cve": "CVE-2016-11083",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11083"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 2.2.0. It allows XSS because it configures files to be opened in a browser window.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11083",
"url": "https://www.suse.com/security/cve/CVE-2016-11083"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11083"
},
{
"cve": "CVE-2016-11084",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2016-11084"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 2.1.0. It allows XSS via CSRF.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2016-11084",
"url": "https://www.suse.com/security/cve/CVE-2016-11084"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2016-11084"
},
{
"cve": "CVE-2017-18872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2017-18872"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in Mattermost Server before 4.4.3 and 4.3.3. Attackers could reconfigure an OAuth app in some cases where Mattermost is an OAuth 2.0 service provider.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2017-18872",
"url": "https://www.suse.com/security/cve/CVE-2017-18872"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2017-18872"
},
{
"cve": "CVE-2023-32199",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32199"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been identified within Rancher \nManager, where after removing a custom GlobalRole that gives \nadministrative access or the corresponding binding, the user still \nretains access to clusters. This only affects custom Global Roles that have a * on * in * rule for resources or have a * on * rule for non-resource URLs",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32199",
"url": "https://www.suse.com/security/cve/CVE-2023-32199"
},
{
"category": "external",
"summary": "SUSE Bug 1249102 for CVE-2023-32199",
"url": "https://bugzilla.suse.com/1249102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-32199"
},
{
"cve": "CVE-2024-58269",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-58269"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability has been identified in Rancher Manager, where sensitive \ninformation, including secret data, cluster import URLs, and \nregistration tokens, is exposed to any entity with access to Rancher \naudit logs.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-58269",
"url": "https://www.suse.com/security/cve/CVE-2024-58269"
},
{
"category": "external",
"summary": "SUSE Bug 1251532 for CVE-2024-58269",
"url": "https://bugzilla.suse.com/1251532"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-58269"
},
{
"cve": "CVE-2025-10545",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10545"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.5.x \u003c= 10.5.10, 10.11.x \u003c= 10.11.2 fail to properly validate guest user permissions when adding channel members which allows guest users to add any team members to their private channels via the `/api/v4/channels/{channel_id}/members` endpoint",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10545",
"url": "https://www.suse.com/security/cve/CVE-2025-10545"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-10545"
},
{
"cve": "CVE-2025-10678",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10678"
}
],
"notes": [
{
"category": "general",
"text": "NetBird VPN when installed using vendor\u0027s provided script failed to remove or change default password of an admin account created by ZITADEL.\nThis issue affects instances installed using vendor\u0027s provided script. This issue may affect instances created with Docker if the default password was not changed nor the user was removed.\n\nThis issue has been fixed in version 0.57.0",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10678",
"url": "https://www.suse.com/security/cve/CVE-2025-10678"
},
{
"category": "external",
"summary": "SUSE Bug 1252329 for CVE-2025-10678",
"url": "https://bugzilla.suse.com/1252329"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-10678"
},
{
"cve": "CVE-2025-10954",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-10954"
}
],
"notes": [
{
"category": "general",
"text": "Versions of the package github.com/nyaruka/phonenumbers before 1.2.2 are vulnerable to Improper Validation of Syntactic Correctness of Input in the phonenumbers.Parse() function. An attacker can cause a panic by providing crafted input causing a \"runtime error: slice bounds out of range\".",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-10954",
"url": "https://www.suse.com/security/cve/CVE-2025-10954"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-10954"
},
{
"cve": "CVE-2025-11374",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11374"
}
],
"notes": [
{
"category": "general",
"text": "Consul and Consul Enterprise\u0027s (\"Consul\") key/value endpoint is vulnerable to denial of service (DoS) due to incorrect Content Length header validation. This vulnerability, CVE-2025-11374, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11374",
"url": "https://www.suse.com/security/cve/CVE-2025-11374"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-11374"
},
{
"cve": "CVE-2025-11375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11375"
}
],
"notes": [
{
"category": "general",
"text": "Consul and Consul Enterprise\u0027s (\"Consul\") event endpoint is vulnerable to denial of service (DoS) due to lack of maximum value on the Content Length header. This vulnerability, CVE-2025-11375, is fixed in Consul Community Edition 1.22.0 and Consul Enterprise 1.22.0, 1.21.6, 1.20.8 and 1.18.12.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11375",
"url": "https://www.suse.com/security/cve/CVE-2025-11375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-11375"
},
{
"cve": "CVE-2025-11579",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11579"
}
],
"notes": [
{
"category": "general",
"text": "github.com/nwaples/rardecode versions \u003c=2.1.1 fail to restrict the dictionary size when reading large RAR dictionary sizes, which allows an attacker to provide a specially crafted RAR file and cause Denial of Service via an Out Of Memory Crash.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11579",
"url": "https://www.suse.com/security/cve/CVE-2025-11579"
},
{
"category": "external",
"summary": "SUSE Bug 1251871 for CVE-2025-11579",
"url": "https://bugzilla.suse.com/1251871"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-11579"
},
{
"cve": "CVE-2025-11621",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-11621"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise\u0027s (\"Vault\") AWS Auth method may be susceptible to authentication bypass if the role of the configured bound_principal_iam is the same across AWS accounts, or uses a wildcard. This vulnerability, CVE-2025-11621, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.21.0, 1.20.5, 1.19.11, and 1.16.27",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-11621",
"url": "https://www.suse.com/security/cve/CVE-2025-11621"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-11621"
},
{
"cve": "CVE-2025-12044",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-12044"
}
],
"notes": [
{
"category": "general",
"text": "Vault and Vault Enterprise (\"Vault\") are vulnerable to an unauthenticated denial of service when processing JSON payloads. This occurs due to a regression from a previous fix for [+HCSEC-2025-24+|https://discuss.hashicorp.com/t/hcsec-2025-24-vault-denial-of-service-though-complex-json-payloads/76393] which allowed for processing JSON payloads before applying rate limits. This vulnerability, CVE-2025-12044, is fixed in Vault Community Edition 1.21.0 and Vault Enterprise 1.16.27, 1.19.11, 1.20.5, and 1.21.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-12044",
"url": "https://www.suse.com/security/cve/CVE-2025-12044"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-12044"
},
{
"cve": "CVE-2025-26625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-26625"
}
],
"notes": [
{
"category": "general",
"text": "Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-26625",
"url": "https://www.suse.com/security/cve/CVE-2025-26625"
},
{
"category": "external",
"summary": "SUSE Bug 1252259 for CVE-2025-26625",
"url": "https://bugzilla.suse.com/1252259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-26625"
},
{
"cve": "CVE-2025-27093",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27093"
}
],
"notes": [
{
"category": "general",
"text": "Sliver is a command and control framework that uses a custom Wireguard netstack. In versions 1.5.43 and earlier, and in development version 1.6.0-dev, the netstack does not limit traffic between Wireguard clients. This allows clients to communicate with each other unrestrictedly, potentially enabling leaked or recovered keypairs to be used to attack operators or allowing port forwardings to be accessible from other implants.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27093",
"url": "https://www.suse.com/security/cve/CVE-2025-27093"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-27093"
},
{
"cve": "CVE-2025-41410",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-41410"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.10.x \u003c= 10.10.2, 10.5.x \u003c= 10.5.10, 10.11.x \u003c= 10.11.2 fail to validate email ownership during Slack import process which allows attackers to create verified user accounts with arbitrary email domains via malicious Slack import data to bypass email-based team access restrictions",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-41410",
"url": "https://www.suse.com/security/cve/CVE-2025-41410"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-41410"
},
{
"cve": "CVE-2025-41443",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-41443"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.5.x \u003c= 10.5.12, 10.11.x \u003c= 10.11.2 fail to properly validate guest user permissions when accessing channel information which allows guest users to discover active public channels and their metadata via the `/api/v4/teams/{team_id}/channels/ids` endpoint",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-41443",
"url": "https://www.suse.com/security/cve/CVE-2025-41443"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-41443"
},
{
"cve": "CVE-2025-54286",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54286"
}
],
"notes": [
{
"category": "general",
"text": "Cross-Site Request Forgery (CSRF) in LXD-UI in Canonical LXD versions \u003e= 5.0 on Linux allows an attacker to create and start container instances without user consent via crafted HTML form submissions exploiting client certificate authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54286",
"url": "https://www.suse.com/security/cve/CVE-2025-54286"
},
{
"category": "external",
"summary": "SUSE Bug 1250945 for CVE-2025-54286",
"url": "https://bugzilla.suse.com/1250945"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54286"
},
{
"cve": "CVE-2025-54287",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54287"
}
],
"notes": [
{
"category": "general",
"text": "Template Injection in instance snapshot creation component in Canonical LXD (\u003e= 4.0) allows an attacker with instance configuration \npermissions to read arbitrary files on the host system via specially crafted snapshot pattern templates using the Pongo2 template engine.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54287",
"url": "https://www.suse.com/security/cve/CVE-2025-54287"
},
{
"category": "external",
"summary": "SUSE Bug 1250943 for CVE-2025-54287",
"url": "https://bugzilla.suse.com/1250943"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54287"
},
{
"cve": "CVE-2025-54288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54288"
}
],
"notes": [
{
"category": "general",
"text": "Information Spoofing in devLXD Server in Canonical LXD versions 4.0 and above on Linux container platforms allows attackers with root privileges within any container to impersonate other containers and obtain their metadata, configuration, and device information via spoofed process names in the command line.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54288",
"url": "https://www.suse.com/security/cve/CVE-2025-54288"
},
{
"category": "external",
"summary": "SUSE Bug 1250939 for CVE-2025-54288",
"url": "https://bugzilla.suse.com/1250939"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54288"
},
{
"cve": "CVE-2025-54289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54289"
}
],
"notes": [
{
"category": "general",
"text": "Privilege Escalation in operations API in Canonical LXD \u003c6.5 on multiple platforms allows attacker with read permissions to hijack terminal or console sessions and execute arbitrary commands via WebSocket connection hijacking format",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54289",
"url": "https://www.suse.com/security/cve/CVE-2025-54289"
},
{
"category": "external",
"summary": "SUSE Bug 1250933 for CVE-2025-54289",
"url": "https://bugzilla.suse.com/1250933"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54289"
},
{
"cve": "CVE-2025-54290",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54290"
}
],
"notes": [
{
"category": "general",
"text": "Information disclosure in image export API in Canonical LXD before 6.5 and 5.21.4 on Linux allows network attackers to determine project existence without authentication via crafted requests using wildcard fingerprints.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54290",
"url": "https://www.suse.com/security/cve/CVE-2025-54290"
},
{
"category": "external",
"summary": "SUSE Bug 1250934 for CVE-2025-54290",
"url": "https://bugzilla.suse.com/1250934"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54290"
},
{
"cve": "CVE-2025-54291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54291"
}
],
"notes": [
{
"category": "general",
"text": "Information disclosure in images API in Canonical LXD before 6.5 and 5.21.4 on all platforms allows unauthenticated remote attackers to determine project existence via differing HTTP status code responses.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54291",
"url": "https://www.suse.com/security/cve/CVE-2025-54291"
},
{
"category": "external",
"summary": "SUSE Bug 1250935 for CVE-2025-54291",
"url": "https://bugzilla.suse.com/1250935"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54291"
},
{
"cve": "CVE-2025-54293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54293"
}
],
"notes": [
{
"category": "general",
"text": "Path Traversal in the log file retrieval function in Canonical LXD 5.0 LTS on Linux allows authenticated remote attackers to read arbitrary files on the host system via crafted log file names or symbolic links.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54293",
"url": "https://www.suse.com/security/cve/CVE-2025-54293"
},
{
"category": "external",
"summary": "SUSE Bug 1250936 for CVE-2025-54293",
"url": "https://bugzilla.suse.com/1250936"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54293"
},
{
"cve": "CVE-2025-54469",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54469"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was identified in NeuVector, where the enforcer used environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT to generate a command to be executed via popen, without first sanitising their values.\n\n\nThe entry process of the enforcer container is the monitor\n process. When the enforcer container stops, the monitor process checks \nwhether the consul subprocess has exited. To perform this check, the \nmonitor process uses the popen function to execute a shell command that determines whether the ports used by the consul subprocess are still active.\n\n\nThe values of environment variables CLUSTER_RPC_PORT and CLUSTER_LAN_PORT\n are used directly to compose shell commands via popen without \nvalidation or sanitization. This behavior could allow a malicious user \nto inject malicious commands through these variables within the enforcer\n container.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54469",
"url": "https://www.suse.com/security/cve/CVE-2025-54469"
},
{
"category": "external",
"summary": "SUSE Bug 1249340 for CVE-2025-54469",
"url": "https://bugzilla.suse.com/1249340"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.9,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-54469"
},
{
"cve": "CVE-2025-54470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54470"
}
],
"notes": [
{
"category": "general",
"text": "This vulnerability affects NeuVector deployments only when the Report anonymous cluster data option is enabled. When this option is enabled, NeuVector sends anonymous telemetry data to the telemetry server.\n\n\nIn affected versions, NeuVector does not enforce TLS \ncertificate verification when transmitting anonymous cluster data to the\n telemetry server. As a result, the communication channel is susceptible\n to man-in-the-middle (MITM) attacks, where an attacker could intercept \nor modify the transmitted data. Additionally, NeuVector loads the \nresponse of the telemetry server is loaded into memory without size \nlimitation, which makes it vulnerable to a Denial of Service(DoS) \nattack",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54470",
"url": "https://www.suse.com/security/cve/CVE-2025-54470"
},
{
"category": "external",
"summary": "SUSE Bug 1249341 for CVE-2025-54470",
"url": "https://bugzilla.suse.com/1249341"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-54470"
},
{
"cve": "CVE-2025-54471",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54471"
}
],
"notes": [
{
"category": "general",
"text": "NeuVector used a hard-coded cryptographic key embedded in the source \ncode. At compilation time, the key value was replaced with the secret \nkey value and used to encrypt sensitive configurations when NeuVector \nstores the data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54471",
"url": "https://www.suse.com/security/cve/CVE-2025-54471"
},
{
"category": "external",
"summary": "SUSE Bug 1249376 for CVE-2025-54471",
"url": "https://bugzilla.suse.com/1249376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-54471"
},
{
"cve": "CVE-2025-54499",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-54499"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.5.x \u003c= 10.5.10, 10.11.x \u003c= 10.11.2 fail to use constant-time comparison for sensitive string comparisons which allows attackers to exploit timing oracles to perform byte-by-byte brute force attacks via response time analysis on Cloud API keys and OAuth client secrets",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-54499",
"url": "https://www.suse.com/security/cve/CVE-2025-54499"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-54499"
},
{
"cve": "CVE-2025-58073",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58073"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.11.x \u003c= 10.11.1, 10.10.x \u003c= 10.10.2, 10.5.x \u003c= 10.5.10 fail to verify a user has permission to join a Mattermost team using the original invite token which allows any attacked to join any team on a Mattermost server regardless of restrictions via manipulating the OAuth state.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58073",
"url": "https://www.suse.com/security/cve/CVE-2025-58073"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-58073"
},
{
"cve": "CVE-2025-58075",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58075"
}
],
"notes": [
{
"category": "general",
"text": "Mattermost versions 10.11.x \u003c= 10.11.1, 10.10.x \u003c= 10.10.2, 10.5.x \u003c= 10.5.10 fail to verify a user has permission to join a Mattermost team using the original invite token which allows any attacked to join any team on a Mattermost server regardless of restrictions via manipulating the RelayState",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58075",
"url": "https://www.suse.com/security/cve/CVE-2025-58075"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-58075"
},
{
"cve": "CVE-2025-58356",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-58356"
}
],
"notes": [
{
"category": "general",
"text": "Constellation is the first Confidential Kubernetes. The Constellation CVM image uses LUKS2-encrypted volumes for persistent storage. When opening an encrypted storage device, the CVM uses the libcryptsetup function crypt_activate_by_passhrase. If the VM is successful in opening the partition with the disk encryption key, it treats the volume as confidential. However, due to the unsafe handling of null keyslot algorithms in the cryptsetup 2.8.1, it is possible that the opened volume is not encrypted at all. Cryptsetup prior to version 2.8.1 does not report an error when processing LUKS2-formatted disks that use the cipher_null-ecb algorithm in the keyslot encryption field. This vulnerability is fixed in 2.24.0.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-58356",
"url": "https://www.suse.com/security/cve/CVE-2025-58356"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-58356"
},
{
"cve": "CVE-2025-59043",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59043"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao is an open source identity-based secrets management system. In OpenBao versions prior to 2.4.1, JSON objects after decoding may use significantly more memory than their serialized version. It is possible to craft a JSON payload to maximize the factor between serialized memory usage and deserialized memory usage, similar to a zip bomb, with factors reaching approximately 35. This can be used to circumvent the max_request_size configuration parameter which is intended to protect against denial of service attacks. The request body is parsed into a map very early in the request handling chain before authentication, which means an unauthenticated attacker can send a specifically crafted JSON object and cause an out-of-memory crash. Additionally, for requests with large numbers of strings, the audit subsystem can consume large quantities of CPU. The vulnerability is fixed in version 2.4.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59043",
"url": "https://www.suse.com/security/cve/CVE-2025-59043"
},
{
"category": "external",
"summary": "SUSE Bug 1252280 for CVE-2025-59043",
"url": "https://bugzilla.suse.com/1252280"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59043"
},
{
"cve": "CVE-2025-59048",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59048"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao\u0027s AWS Plugin generates AWS access credentials based on IAM policies. Prior to version 0.1.1, the AWS Plugin is vulnerable to cross-account IAM role Impersonation in the AWS auth method. The vulnerability allows an IAM role from an untrusted AWS account to authenticate by impersonating a role with the same name in a trusted account, leading to unauthorized access. This impacts all users of the auth-aws plugin who operate in a multi-account AWS environment where IAM role names may not be unique across accounts. This vulnerability has been patched in version 0.1.1 of the auth-aws plugin. A workaround for this issue involves guaranteeing that IAM role names are unique across all AWS accounts that could potentially interact with your OpenBao environment, and to audit for any duplicate IAM roles.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59048",
"url": "https://www.suse.com/security/cve/CVE-2025-59048"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59048"
},
{
"cve": "CVE-2025-59530",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59530"
}
],
"notes": [
{
"category": "general",
"text": "quic-go is an implementation of the QUIC protocol in Go. In versions prior to 0.49.0, 0.54.1, and 0.55.0, a misbehaving or malicious server can cause a denial-of-service (DoS) attack on the quic-go client by triggering an assertion failure, leading to a process crash. This requires no authentication and can be exploited during the handshake phase. This was observed in the wild with certain server implementations. quic-go needs to be able to handle misbehaving server implementations, including those that prematurely send a HANDSHAKE_DONE frame. Versions 0.49.0, 0.54.1, and 0.55.0 discard Initial keys when receiving a HANDSHAKE_DONE frame, thereby correctly handling premature HANDSHAKE_DONE frames.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59530",
"url": "https://www.suse.com/security/cve/CVE-2025-59530"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-59530"
},
{
"cve": "CVE-2025-59836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59836"
}
],
"notes": [
{
"category": "general",
"text": "Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to 1.1.5 and 1.0.2, there is a nil pointer dereference vulnerability in the Omni Resource Service allows unauthenticated users to cause a server panic and denial of service by sending empty create/update resource requests through the API endpoints. The vulnerability exists in the isSensitiveSpec function which calls grpcomni.CreateResource without checking if the resource\u0027s metadata field is nil. When a resource is created with an empty Metadata field, the CreateResource function attempts to access resource.Metadata.Version causing a segmentation fault. This vulnerability is fixed in 1.1.5 and 1.0.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59836",
"url": "https://www.suse.com/security/cve/CVE-2025-59836"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-59836"
},
{
"cve": "CVE-2025-59937",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-59937"
}
],
"notes": [
{
"category": "general",
"text": "go-mail is a comprehensive library for sending mails with Go. In versions 0.7.0 and below, due to incorrect handling of the mail.Address values when a sender- or recipient address is passed to the corresponding MAIL FROM or RCPT TO commands of the SMTP client, there is a possibility of wrong address routing or even ESMTP parameter smuggling. For successful exploitation, it is required that the user\u0027s code allows for arbitrary mail address input (i. e. through a web form or similar). If only static mail addresses are used (i. e. in a config file) and the mail addresses in use do not consist of quoted local parts, this should not affect users. This issue is fixed in version 0.7.1",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-59937",
"url": "https://www.suse.com/security/cve/CVE-2025-59937"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-59937"
},
{
"cve": "CVE-2025-61141",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61141"
}
],
"notes": [
{
"category": "general",
"text": "sqls-server/sqls 0.2.28 is vulnerable to command injection in the config command because the openEditor function passes the EDITOR environment variable and config file path to sh -c without sanitization, allowing attackers to execute arbitrary commands.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61141",
"url": "https://www.suse.com/security/cve/CVE-2025-61141"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61141"
},
{
"cve": "CVE-2025-61524",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61524"
}
],
"notes": [
{
"category": "general",
"text": "An issue in the permission verification module and organization/application editing interface in Casdoor v2.26.0 and before, and fixed in v.2.63.0, allows remote authenticated administrators of any organization within the system to bypass the system\u0027s permission verification mechanism by directly concatenating URLs after login",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61524",
"url": "https://www.suse.com/security/cve/CVE-2025-61524"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61524"
},
{
"cve": "CVE-2025-61581",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61581"
}
],
"notes": [
{
"category": "general",
"text": "** UNSUPPORTED WHEN ASSIGNED ** Inefficient Regular Expression Complexity vulnerability in Apache Traffic Control.\n\nThis issue affects Apache Traffic Control: all versions.\n\nPeople with access to the management interface of the Traffic Router component could specify malicious patterns and cause unavailability.\n\nAs this project is retired, we do not plan to release a version that fixes this issue. Users are recommended to find an alternative or restrict access to the instance to trusted users.\n\nNOTE: This vulnerability only affects products that are no longer supported by the maintainer.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61581",
"url": "https://www.suse.com/security/cve/CVE-2025-61581"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61581"
},
{
"cve": "CVE-2025-61688",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-61688"
}
],
"notes": [
{
"category": "general",
"text": "Omni manages Kubernetes on bare metal, virtual machines, or in a cloud. Prior to 1.1.5 and 1.0.2, Omni might leak sensitive information via an API.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-61688",
"url": "https://www.suse.com/security/cve/CVE-2025-61688"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-61688"
},
{
"cve": "CVE-2025-62156",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62156"
}
],
"notes": [
{
"category": "general",
"text": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 contain a Zip Slip path traversal vulnerability in artifact extraction. During artifact extraction the unpack/untar logic (workflow/executor/executor.go) uses filepath.Join(dest, filepath.Clean(header.Name)) without validating that header.Name stays within the intended extraction directory. A malicious archive entry can supply a traversal or absolute path that, after cleaning, overrides the destination directory and causes files to be written outside the /work/tmp extraction path and into system directories such as /etc inside the container. The vulnerability enables arbitrary file creation or overwrite in system configuration locations (for example /etc/passwd, /etc/hosts, /etc/crontab), which can lead to privilege escalation or persistence within the affected container. Update to 3.6.12 or 3.7.3 to remediate the issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62156",
"url": "https://www.suse.com/security/cve/CVE-2025-62156"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62156"
},
{
"cve": "CVE-2025-62157",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62157"
}
],
"notes": [
{
"category": "general",
"text": "Argo Workflows is an open source container-native workflow engine for orchestrating parallel jobs on Kubernetes. Argo Workflows versions prior to 3.6.12 and versions 3.7.0 through 3.7.2 expose artifact repository credentials in plaintext in workflow-controller pod logs. An attacker with permissions to read pod logs in a namespace running Argo Workflows can read the workflow-controller logs and obtain credentials to the artifact repository. Update to versions 3.6.12 or 3.7.3 to remediate the vulnerability. No known workarounds exist.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62157",
"url": "https://www.suse.com/security/cve/CVE-2025-62157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62157"
},
{
"cve": "CVE-2025-62375",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62375"
}
],
"notes": [
{
"category": "general",
"text": "go-witness and witness are Go modules for generating attestations. In go-witness versions 0.8.6 and earlier and witness versions 0.9.2 and earlier the AWS attestor improperly verifies AWS EC2 instance identity documents. Verification can incorrectly succeed when a signature is not present or is empty, and when RSA signature verification fails. The attestor also embeds a single legacy global AWS public certificate and does not account for newer region specific certificates issued in 2024, making detection of forged documents difficult without additional trusted region data. An attacker able to supply or intercept instance identity document data (such as through Instance Metadata Service impersonation) can cause a forged identity document to be accepted, leading to incorrect trust decisions based on the attestation. This is fixed in go-witness 0.9.1 and witness 0.10.1. As a workaround, manually verify the included identity document, signature, and public key with standard tools (for example openssl) following AWS\u0027s verification guidance, or disable use of the AWS attestor until upgraded.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62375",
"url": "https://www.suse.com/security/cve/CVE-2025-62375"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-62375"
},
{
"cve": "CVE-2025-62506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62506"
}
],
"notes": [
{
"category": "general",
"text": "MinIO is a high-performance object storage system. In all versions prior to RELEASE.2025-10-15T17-29-55Z, a privilege escalation vulnerability allows service accounts and STS (Security Token Service) accounts with restricted session policies to bypass their inline policy restrictions when performing operations on their own account, specifically when creating new service accounts for the same user. The vulnerability exists in the IAM policy validation logic where the code incorrectly relied on the DenyOnly argument when validating session policies for restricted accounts. When a session policy is present, the system should validate that the action is allowed by the session policy, not just that it is not denied. An attacker with valid credentials for a restricted service or STS account can create a new service account for itself without policy restrictions, resulting in a new service account with full parent privileges instead of being restricted by the inline policy. This allows the attacker to access buckets and objects beyond their intended restrictions and modify, delete, or create objects outside their authorized scope. The vulnerability is fixed in version RELEASE.2025-10-15T17-29-55Z.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62506",
"url": "https://www.suse.com/security/cve/CVE-2025-62506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62506"
},
{
"cve": "CVE-2025-62513",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62513"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao is an open source identity-based secrets management system. In versions 2.2.0 to 2.4.1, OpenBao\u0027s audit log experienced a regression wherein raw HTTP bodies used by few endpoints were not correctly redacted (HMAC\u0027d). This impacts those using the ACME functionality of PKI, resulting in short-lived ACME verification challenge codes being leaked in the audit logs. Additionally, this impacts those using the OIDC issuer functionality of the identity subsystem, auth and token response codes along with claims could be leaked in the audit logs. ACME verification codes are not usable after verification or challenge expiry so are of limited long-term use. This issue has been patched in OpenBao 2.4.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62513",
"url": "https://www.suse.com/security/cve/CVE-2025-62513"
},
{
"category": "external",
"summary": "SUSE Bug 1252506 for CVE-2025-62513",
"url": "https://bugzilla.suse.com/1252506"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62513"
},
{
"cve": "CVE-2025-62705",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62705"
}
],
"notes": [
{
"category": "general",
"text": "OpenBao is an open source identity-based secrets management system. Prior to version 2.4.2, OpenBao\u0027s audit log did not appropriately redact fields when relevant subsystems sent []byte response parameters rather than strings. This includes, but is not limited to sys/raw with use of encoding=base64, all data would be emitted unredacted to the audit log, and Transit, when performing a signing operation with a derived Ed25519 key, would emit public keys to the audit log. This issue has been patched in OpenBao 2.4.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62705",
"url": "https://www.suse.com/security/cve/CVE-2025-62705"
},
{
"category": "external",
"summary": "SUSE Bug 1252505 for CVE-2025-62705",
"url": "https://bugzilla.suse.com/1252505"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-62705"
},
{
"cve": "CVE-2025-62714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62714"
}
],
"notes": [
{
"category": "general",
"text": "Karmada Dashboard is a general-purpose, web-based control panel for Karmada which is a multi-cluster management project. Prior to version 0.2.0, there is an authentication bypass vulnerability in the Karmada Dashboard API. The backend API endpoints (e.g., /api/v1/secret, /api/v1/service) did not enforce authentication, allowing unauthenticated users to access sensitive cluster information such as Secrets and Services directly. Although the web UI required a valid JWT for access, the API itself remained exposed to direct requests without any authentication checks. Any user or entity with network access to the Karmada Dashboard service could exploit this vulnerability to retrieve sensitive data.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62714",
"url": "https://www.suse.com/security/cve/CVE-2025-62714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "not set"
}
],
"title": "CVE-2025-62714"
},
{
"cve": "CVE-2025-62725",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62725"
}
],
"notes": [
{
"category": "general",
"text": "Docker Compose trusts the path information embedded in remote OCI compose artifacts. When a layer includes the annotations com.docker.compose.extends or com.docker.compose.envfile, Compose joins the attacker-supplied value from com.docker.compose.file/com.docker.compose.envfile with its local cache directory and writes the file there. This affects any platform or workflow that resolves remote OCI compose artifacts, Docker Desktop, standalone Compose binaries on Linux, CI/CD runners, cloud dev environments is affected. An attacker can escape the cache directory and overwrite arbitrary files on the machine running docker compose, even if the user only runs read-only commands such as docker compose config or docker compose ps. This issue is fixed in v2.40.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62725",
"url": "https://www.suse.com/security/cve/CVE-2025-62725"
},
{
"category": "external",
"summary": "SUSE Bug 1252752 for CVE-2025-62725",
"url": "https://bugzilla.suse.com/1252752"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-62725"
},
{
"cve": "CVE-2025-62820",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-62820"
}
],
"notes": [
{
"category": "general",
"text": "Slack Nebula before 1.9.7 mishandles CIDR in some configurations and thus accepts arbitrary source IP addresses within the Nebula network.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-62820",
"url": "https://www.suse.com/security/cve/CVE-2025-62820"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-62820"
},
{
"cve": "CVE-2025-64101",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64101"
}
],
"notes": [
{
"category": "general",
"text": "Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, a potential vulnerability exists in ZITADEL\u0027s password reset mechanism. ZITADEL utilizes the Forwarded or X-Forwarded-Host header from incoming requests to construct the URL for the password reset confirmation link. This link, containing a secret code, is then emailed to the user. If an attacker can manipulate these headers (e.g., via host header injection), they could cause ZITADEL to generate a password reset link pointing to a malicious domain controlled by the attacker. If the user clicks this manipulated link in the email, the secret reset code embedded in the URL can be captured by the attacker. This captured code could then be used to reset the user\u0027s password and gain unauthorized access to their account. It\u0027s important to note that this specific attack vector is mitigated for accounts that have Multi-Factor Authentication (MFA) or Passwordless authentication enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64101",
"url": "https://www.suse.com/security/cve/CVE-2025-64101"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-64101"
},
{
"cve": "CVE-2025-64102",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64102"
}
],
"notes": [
{
"category": "general",
"text": "Zitadel is open-source identity infrastructure software. Prior to 4.6.0, 3.4.3, and 2.71.18, an attacker can perform an online brute-force attack on OTP, TOTP, and passwords. While Zitadel allows preventing online brute force attacks in scenarios like TOTP, Email OTP, or passwords using a lockout mechanism. The mechanism is not enabled by default and can cause a denial of service for the corresponding user if enabled. Additionally, the mitigation strategies were not fully implemented in the more recent resource-based APIs. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64102",
"url": "https://www.suse.com/security/cve/CVE-2025-64102"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-64102"
},
{
"cve": "CVE-2025-64103",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64103"
}
],
"notes": [
{
"category": "general",
"text": "Starting from 2.53.6, 2.54.3, and 2.55.0, Zitadel only required multi factor authentication in case the login policy has either enabled requireMFA or requireMFAForLocalUsers. If a user has set up MFA without this requirement, Zitadel would consider single factor auhtenticated sessions as valid as well and not require multiple factors. Bypassing second authentication factors weakens multifactor authentication and enables attackers to bypass the more secure factor. An attacker can target the TOTP code alone, only six digits, bypassing password verification entirely and potentially compromising accounts with 2FA enabled. This vulnerability is fixed in 4.6.0, 3.4.3, and 2.71.18.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64103",
"url": "https://www.suse.com/security/cve/CVE-2025-64103"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20251105T184115-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-07T00:00:00Z",
"details": "critical"
}
],
"title": "CVE-2025-64103"
}
]
}
opensuse-su-2025:15643-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "git-lfs-3.7.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the git-lfs-3.7.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15643",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15643-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-26625 page",
"url": "https://www.suse.com/security/cve/CVE-2025-26625/"
}
],
"title": "git-lfs-3.7.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-10-17T00:00:00Z",
"generator": {
"date": "2025-10-17T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15643-1",
"initial_release_date": "2025-10-17T00:00:00Z",
"revision_history": [
{
"date": "2025-10-17T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-3.7.1-1.1.aarch64",
"product": {
"name": "git-lfs-3.7.1-1.1.aarch64",
"product_id": "git-lfs-3.7.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-3.7.1-1.1.ppc64le",
"product": {
"name": "git-lfs-3.7.1-1.1.ppc64le",
"product_id": "git-lfs-3.7.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-3.7.1-1.1.s390x",
"product": {
"name": "git-lfs-3.7.1-1.1.s390x",
"product_id": "git-lfs-3.7.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "git-lfs-3.7.1-1.1.x86_64",
"product": {
"name": "git-lfs-3.7.1-1.1.x86_64",
"product_id": "git-lfs-3.7.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-3.7.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-lfs-3.7.1-1.1.aarch64"
},
"product_reference": "git-lfs-3.7.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-3.7.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-lfs-3.7.1-1.1.ppc64le"
},
"product_reference": "git-lfs-3.7.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-3.7.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-lfs-3.7.1-1.1.s390x"
},
"product_reference": "git-lfs-3.7.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "git-lfs-3.7.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:git-lfs-3.7.1-1.1.x86_64"
},
"product_reference": "git-lfs-3.7.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-26625",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-26625"
}
],
"notes": [
{
"category": "general",
"text": "Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.aarch64",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.s390x",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-26625",
"url": "https://www.suse.com/security/cve/CVE-2025-26625"
},
{
"category": "external",
"summary": "SUSE Bug 1252259 for CVE-2025-26625",
"url": "https://bugzilla.suse.com/1252259"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.aarch64",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.s390x",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.aarch64",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.ppc64le",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.s390x",
"openSUSE Tumbleweed:git-lfs-3.7.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-17T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-26625"
}
]
}
ghsa-6pvw-g552-53c5
Vulnerability from github
Impact
When populating a Git repository's working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS.
Git LFS has resolved this problem by revising the git lfs checkout and git lfs pull commands so that they check for symbolic links in the same manner as performed by Git before writing to files in the working tree. These commands now also remove existing files in the working tree before writing new files in their place.
As well, Git LFS has resolved a problem whereby the git lfs checkout and git lfs pull commands, when run in a bare repository, could write to files visible outside the repository. While a specific and relatively unlikely set of conditions were required for this to occur, it is no longer possible under any circumstances.
Patches
This problem exists in all versions since 0.5.2 and is patched in v3.7.1. All users should upgrade to v3.7.1.
Workarounds
Support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.
References
- https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5
- https://nvd.nist.gov/vuln/detail/CVE-2025-26625
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625
- https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1
- git-lfs/git-lfs@5c11ffce9a
- git-lfs/git-lfs@0cffe93176
- git-lfs/git-lfs@d02bd13f02
For more information
If there are any questions or comments about this advisory: * For general questions, start a discussion in the Git LFS discussion forum. * For reports of additional vulnerabilities, please follow the Git LFS security reporting policy.
{
"affected": [
{
"database_specific": {
"last_known_affected_version_range": "\u003c= 3.7.0"
},
"package": {
"ecosystem": "Go",
"name": "github.com/git-lfs/git-lfs"
},
"ranges": [
{
"events": [
{
"introduced": "0.5.2"
},
{
"fixed": "3.7.1"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-26625"
],
"database_specific": {
"cwe_ids": [
"CWE-59"
],
"github_reviewed": true,
"github_reviewed_at": "2025-10-17T17:05:03Z",
"nvd_published_at": "2025-10-17T16:15:37Z",
"severity": "HIGH"
},
"details": "### Impact\n\nWhen populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS.\n\nGit LFS has resolved this problem by revising the `git lfs checkout` and `git lfs pull` commands so that they check for symbolic links in the same manner as performed by Git before writing to files in the working tree. These commands now also remove existing files in the working tree before writing new files in their place.\n\nAs well, Git LFS has resolved a problem whereby the `git lfs checkout` and `git lfs pull` commands, when run in a bare repository, could write to files visible outside the repository. While a specific and relatively unlikely set of conditions were required for this to occur, it is no longer possible under any circumstances.\n\n### Patches\n\nThis problem exists in all versions since 0.5.2 and is patched in v3.7.1. All users should upgrade to v3.7.1.\n\n### Workarounds\n\nSupport for symlinks in Git may be disabled by setting the `core.symlinks` configuration option to `false`, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets.\n\n### References\n\n- https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5\n- https://nvd.nist.gov/vuln/detail/CVE-2025-26625\n- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625\n- https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1\n- [git-lfs/git-lfs@5c11ffce9a](https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8)\n- [git-lfs/git-lfs@0cffe93176](https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396)\n- [git-lfs/git-lfs@d02bd13f02](https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615)\n\n### For more information\n\nIf there are any questions or comments about this advisory:\n* For general questions, start a discussion in the Git LFS [discussion forum](https://github.com/git-lfs/git-lfs/discussions).\n* For reports of additional vulnerabilities, please follow the Git LFS [security reporting policy](https://github.com/git-lfs/git-lfs/blob/main/SECURITY.md).",
"id": "GHSA-6pvw-g552-53c5",
"modified": "2025-10-17T19:07:33Z",
"published": "2025-10-17T17:05:03Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-26625"
},
{
"type": "WEB",
"url": "https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396"
},
{
"type": "WEB",
"url": "https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8"
},
{
"type": "WEB",
"url": "https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615"
},
{
"type": "WEB",
"url": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-26625"
},
{
"type": "PACKAGE",
"url": "https://github.com/git-lfs/git-lfs"
},
{
"type": "WEB",
"url": "https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Git LFS may write to arbitrary files via crafted symlinks"
}
fkie_cve-2025-26625
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396 | ||
| security-advisories@github.com | https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8 | ||
| security-advisories@github.com | https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615 | ||
| security-advisories@github.com | https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1 | ||
| security-advisories@github.com | https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5 |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Git LFS is a Git extension for versioning large files. In Git LFS versions 0.5.2 through 3.7.0, when populating a Git repository\u0027s working tree with the contents of Git LFS objects, certain Git LFS commands may write to files visible outside the current Git working tree if symbolic or hard links exist which collide with the paths of files tracked by Git LFS. The git lfs checkout and git lfs pull commands do not check for symbolic links before writing to files in the working tree, allowing an attacker to craft a repository containing symbolic or hard links that cause Git LFS to write to arbitrary file system locations accessible to the user running these commands. As well, when the git lfs checkout and git lfs pull commands are run in a bare repository, they could write to files visible outside the repository. The vulnerability is fixed in version 3.7.1. As a workaround, support for symlinks in Git may be disabled by setting the core.symlinks configuration option to false, after which further clones and fetches will not create symbolic links. However, any symbolic or hard links in existing repositories will still provide the opportunity for Git LFS to write to their targets."
}
],
"id": "CVE-2025-26625",
"lastModified": "2025-10-21T19:31:50.020",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "NETWORK",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 8.6,
"baseSeverity": "HIGH",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "PASSIVE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "HIGH",
"vulnIntegrityImpact": "HIGH",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-10-17T16:15:37.260",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/git-lfs/git-lfs/commit/0cffe93176b870055c9dadbb3cc9a4a440e98396"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/git-lfs/git-lfs/commit/5c11ffce9a4f095ff356bc781e2a031abb46c1a8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/git-lfs/git-lfs/commit/d02bd13f02ef76f6807581cd6b34709069cb3615"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/git-lfs/git-lfs/releases/tag/v3.7.1"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/git-lfs/git-lfs/security/advisories/GHSA-6pvw-g552-53c5"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-59"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.