Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55159 (GCVE-0-2025-55159)
Vulnerability from cvelistv5
Published
2025-08-11 23:00
Modified
2025-08-12 14:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
References
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-55159", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-12T14:06:53.117320Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T14:07:00.276Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "slab", "vendor": "tokio-rs", "versions": [ { "status": "affected", "version": "\u003e= 0.4.10, \u003c 0.4.11" } ] } ], "descriptions": [ { "lang": "en", "value": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length." } ], "metrics": [ { "cvssV4_0": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.1, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T23:00:58.915Z", "orgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "shortName": "GitHub_M" }, "references": [ { "name": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv", "tags": [ "x_refsource_CONFIRM" ], "url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv" }, { "name": "https://github.com/tokio-rs/slab/pull/152", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tokio-rs/slab/pull/152" }, { "name": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8", "tags": [ "x_refsource_MISC" ], "url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8" } ], "source": { "advisory": "GHSA-qx2v-8332-m4fv", "discovery": "UNKNOWN" }, "title": "slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check" } }, "cveMetadata": { "assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa", "assignerShortName": "GitHub_M", "cveId": "CVE-2025-55159", "datePublished": "2025-08-11T23:00:58.915Z", "dateReserved": "2025-08-07T18:27:23.306Z", "dateUpdated": "2025-08-12T14:07:00.276Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-55159\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-08-11T23:15:28.173\",\"lastModified\":\"2025-08-12T14:25:33.177\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.\"},{\"lang\":\"es\",\"value\":\"slab es un almacenamiento preasignado para un tipo de dato uniforme. En la versi\u00f3n 0.4.10, el m\u00e9todo get_disjoint_mut verificaba incorrectamente si los \u00edndices estaban dentro de la capacidad del slab en lugar de su longitud, lo que permit\u00eda acceder a memoria no inicializada. Esto pod\u00eda provocar un comportamiento indefinido o posibles fallos. Esto se ha corregido en slab 0.4.11. Una soluci\u00f3n alternativa consiste en evitar el uso de get_disjoint_mut con \u00edndices que puedan superar la longitud real del slab.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"references\":[{\"url\":\"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/tokio-rs/slab/pull/152\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\",\"source\":\"security-advisories@github.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55159\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-12T14:06:53.117320Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T14:06:55.485Z\"}}], \"cna\": {\"title\": \"slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check\", \"source\": {\"advisory\": \"GHSA-qx2v-8332-m4fv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"tokio-rs\", \"product\": \"slab\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 0.4.10, \u003c 0.4.11\"}]}], \"references\": [{\"url\": \"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\", \"name\": \"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/tokio-rs/slab/pull/152\", \"name\": \"https://github.com/tokio-rs/slab/pull/152\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\", \"name\": \"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-08-11T23:00:58.915Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-55159\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-12T14:07:00.276Z\", \"dateReserved\": \"2025-08-07T18:27:23.306Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-08-11T23:00:58.915Z\", \"assignerShortName\": \"GitHub_M\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
ghsa-qx2v-8332-m4fv
Vulnerability from github
Published
2025-08-11 22:45
Modified
2025-08-12 13:17
Severity ?
VLAI Severity ?
Summary
slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check
Details
Impact
The get_disjoint_mut
method in slab v0.4.10 incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes.
Patches
This has been fixed in slab v0.4.11.
Workarounds
Avoid using get_disjoint_mut
with indices that might be beyond the slab's actual length, or upgrade to v0.4.11 or later.
References
{ "affected": [ { "package": { "ecosystem": "crates.io", "name": "slab" }, "ranges": [ { "events": [ { "introduced": "0.4.10" }, { "fixed": "0.4.11" } ], "type": "ECOSYSTEM" } ], "versions": [ "0.4.10" ] } ], "aliases": [ "CVE-2025-55159" ], "database_specific": { "cwe_ids": [ "CWE-119" ], "github_reviewed": true, "github_reviewed_at": "2025-08-11T22:45:20Z", "nvd_published_at": "2025-08-11T23:15:28Z", "severity": "MODERATE" }, "details": "### Impact\n\nThe `get_disjoint_mut` method in slab v0.4.10 incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes.\n\n### Patches\n\nThis has been fixed in slab v0.4.11.\n\n### Workarounds\n\nAvoid using `get_disjoint_mut` with indices that might be beyond the slab\u0027s actual length, or upgrade to v0.4.11 or later.\n\n### References\n\n- [https://github.com/tokio-rs/slab/pull/152](https://github.com/tokio-rs/slab/pull/152)", "id": "GHSA-qx2v-8332-m4fv", "modified": "2025-08-12T13:17:01Z", "published": "2025-08-11T22:45:20Z", "references": [ { "type": "WEB", "url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv" }, { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55159" }, { "type": "WEB", "url": "https://github.com/tokio-rs/slab/pull/152" }, { "type": "WEB", "url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8" }, { "type": "PACKAGE", "url": "https://github.com/tokio-rs/slab" }, { "type": "WEB", "url": "https://rustsec.org/advisories/RUSTSEC-2025-0047.html" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N", "type": "CVSS_V4" } ], "summary": "slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check" }
opensuse-su-2025:15461-1
Vulnerability from csaf_opensuse
Published
2025-08-19 00:00
Modified
2025-08-19 00:00
Summary
aws-efs-utils-2.3.3-1.1 on GA media
Notes
Title of the patch
aws-efs-utils-2.3.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the aws-efs-utils-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15461
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "aws-efs-utils-2.3.3-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the aws-efs-utils-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15461", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15461-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "aws-efs-utils-2.3.3-1.1 on GA media", "tracking": { "current_release_date": "2025-08-19T00:00:00Z", "generator": { "date": "2025-08-19T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15461-1", "initial_release_date": "2025-08-19T00:00:00Z", "revision_history": [ { "date": "2025-08-19T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "aws-efs-utils-2.3.3-1.1.aarch64", "product": { "name": "aws-efs-utils-2.3.3-1.1.aarch64", "product_id": "aws-efs-utils-2.3.3-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "aws-efs-utils-2.3.3-1.1.ppc64le", "product": { "name": "aws-efs-utils-2.3.3-1.1.ppc64le", "product_id": "aws-efs-utils-2.3.3-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "aws-efs-utils-2.3.3-1.1.s390x", "product": { "name": "aws-efs-utils-2.3.3-1.1.s390x", "product_id": "aws-efs-utils-2.3.3-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "aws-efs-utils-2.3.3-1.1.x86_64", "product": { "name": "aws-efs-utils-2.3.3-1.1.x86_64", "product_id": "aws-efs-utils-2.3.3-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "aws-efs-utils-2.3.3-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64" }, "product_reference": "aws-efs-utils-2.3.3-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "aws-efs-utils-2.3.3-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le" }, "product_reference": "aws-efs-utils-2.3.3-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "aws-efs-utils-2.3.3-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x" }, "product_reference": "aws-efs-utils-2.3.3-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "aws-efs-utils-2.3.3-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64" }, "product_reference": "aws-efs-utils-2.3.3-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x", "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-19T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15447-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
jasper-4.2.8-2.1 on GA media
Notes
Title of the patch
jasper-4.2.8-2.1 on GA media
Description of the patch
These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15447
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "jasper-4.2.8-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15447", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15447-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8835 page", "url": "https://www.suse.com/security/cve/CVE-2025-8835/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8836 page", "url": "https://www.suse.com/security/cve/CVE-2025-8836/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8837 page", "url": "https://www.suse.com/security/cve/CVE-2025-8837/" } ], "title": "jasper-4.2.8-2.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15447-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.aarch64", "product": { "name": "jasper-4.2.8-2.1.aarch64", "product_id": "jasper-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.aarch64", "product": { "name": "libjasper-devel-4.2.8-2.1.aarch64", "product_id": "libjasper-devel-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.aarch64", "product": { "name": "libjasper7-4.2.8-2.1.aarch64", "product_id": "libjasper7-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.aarch64", "product": { "name": "libjasper7-32bit-4.2.8-2.1.aarch64", "product_id": "libjasper7-32bit-4.2.8-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.ppc64le", "product": { "name": "jasper-4.2.8-2.1.ppc64le", "product_id": "jasper-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.ppc64le", "product": { "name": "libjasper-devel-4.2.8-2.1.ppc64le", "product_id": "libjasper-devel-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.ppc64le", "product": { "name": "libjasper7-4.2.8-2.1.ppc64le", "product_id": "libjasper7-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.ppc64le", "product": { "name": "libjasper7-32bit-4.2.8-2.1.ppc64le", "product_id": "libjasper7-32bit-4.2.8-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.s390x", "product": { "name": "jasper-4.2.8-2.1.s390x", "product_id": "jasper-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.s390x", "product": { "name": "libjasper-devel-4.2.8-2.1.s390x", "product_id": "libjasper-devel-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.s390x", "product": { "name": "libjasper7-4.2.8-2.1.s390x", "product_id": "libjasper7-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.s390x", "product": { "name": "libjasper7-32bit-4.2.8-2.1.s390x", "product_id": "libjasper7-32bit-4.2.8-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.x86_64", "product": { "name": "jasper-4.2.8-2.1.x86_64", "product_id": "jasper-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.x86_64", "product": { "name": "libjasper-devel-4.2.8-2.1.x86_64", "product_id": "libjasper-devel-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.x86_64", "product": { "name": "libjasper7-4.2.8-2.1.x86_64", "product_id": "libjasper7-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.x86_64", "product": { "name": "libjasper7-32bit-4.2.8-2.1.x86_64", "product_id": "libjasper7-32bit-4.2.8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64" }, "product_reference": "jasper-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le" }, "product_reference": "jasper-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x" }, "product_reference": "jasper-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64" }, "product_reference": "jasper-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64" }, "product_reference": "libjasper-devel-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper-devel-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x" }, "product_reference": "libjasper-devel-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64" }, "product_reference": "libjasper-devel-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64" }, "product_reference": "libjasper7-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper7-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x" }, "product_reference": "libjasper7-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" }, "product_reference": "libjasper7-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-8835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8835" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8835", "url": "https://www.suse.com/security/cve/CVE-2025-8835" }, { "category": "external", "summary": "SUSE Bug 1247904 for CVE-2025-8835", "url": "https://bugzilla.suse.com/1247904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-8835" }, { "cve": "CVE-2025-8836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8836" } ], "notes": [ { "category": "general", "text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8836", "url": "https://www.suse.com/security/cve/CVE-2025-8836" }, { "category": "external", "summary": "SUSE Bug 1247902 for CVE-2025-8836", "url": "https://bugzilla.suse.com/1247902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "low" } ], "title": "CVE-2025-8836" }, { "cve": "CVE-2025-8837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8837" } ], "notes": [ { "category": "general", "text": "A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8837", "url": "https://www.suse.com/security/cve/CVE-2025-8837" }, { "category": "external", "summary": "SUSE Bug 1247901 for CVE-2025-8837", "url": "https://bugzilla.suse.com/1247901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-8837" } ] }
opensuse-su-2025:15470-1
Vulnerability from csaf_opensuse
Published
2025-08-20 00:00
Modified
2025-08-20 00:00
Summary
wicked2nm-1.2.1-1.1 on GA media
Notes
Title of the patch
wicked2nm-1.2.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15470
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "wicked2nm-1.2.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15470", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15470-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "wicked2nm-1.2.1-1.1 on GA media", "tracking": { "current_release_date": "2025-08-20T00:00:00Z", "generator": { "date": "2025-08-20T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15470-1", "initial_release_date": "2025-08-20T00:00:00Z", "revision_history": [ { "date": "2025-08-20T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "wicked2nm-1.2.1-1.1.aarch64", "product": { "name": "wicked2nm-1.2.1-1.1.aarch64", "product_id": "wicked2nm-1.2.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "wicked2nm-1.2.1-1.1.ppc64le", "product": { "name": "wicked2nm-1.2.1-1.1.ppc64le", "product_id": "wicked2nm-1.2.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "wicked2nm-1.2.1-1.1.s390x", "product": { "name": "wicked2nm-1.2.1-1.1.s390x", "product_id": "wicked2nm-1.2.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "wicked2nm-1.2.1-1.1.x86_64", "product": { "name": "wicked2nm-1.2.1-1.1.x86_64", "product_id": "wicked2nm-1.2.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "wicked2nm-1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64" }, "product_reference": "wicked2nm-1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wicked2nm-1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le" }, "product_reference": "wicked2nm-1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wicked2nm-1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x" }, "product_reference": "wicked2nm-1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "wicked2nm-1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64" }, "product_reference": "wicked2nm-1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x", "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-20T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15554-1
Vulnerability from csaf_opensuse
Published
2025-09-15 00:00
Modified
2025-09-15 00:00
Summary
watchexec-2.3.2-2.1 on GA media
Notes
Title of the patch
watchexec-2.3.2-2.1 on GA media
Description of the patch
These are all security issues fixed in the watchexec-2.3.2-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "watchexec-2.3.2-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the watchexec-2.3.2-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15554", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15554-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "watchexec-2.3.2-2.1 on GA media", "tracking": { "current_release_date": "2025-09-15T00:00:00Z", "generator": { "date": "2025-09-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15554-1", "initial_release_date": "2025-09-15T00:00:00Z", "revision_history": [ { "date": "2025-09-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "watchexec-2.3.2-2.1.aarch64", "product": { "name": "watchexec-2.3.2-2.1.aarch64", "product_id": "watchexec-2.3.2-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "watchexec-2.3.2-2.1.ppc64le", "product": { "name": "watchexec-2.3.2-2.1.ppc64le", "product_id": "watchexec-2.3.2-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "watchexec-2.3.2-2.1.s390x", "product": { "name": "watchexec-2.3.2-2.1.s390x", "product_id": "watchexec-2.3.2-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "watchexec-2.3.2-2.1.x86_64", "product": { "name": "watchexec-2.3.2-2.1.x86_64", "product_id": "watchexec-2.3.2-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "watchexec-2.3.2-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64" }, "product_reference": "watchexec-2.3.2-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "watchexec-2.3.2-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le" }, "product_reference": "watchexec-2.3.2-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "watchexec-2.3.2-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x" }, "product_reference": "watchexec-2.3.2-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "watchexec-2.3.2-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64" }, "product_reference": "watchexec-2.3.2-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x", "openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15492-1
Vulnerability from csaf_opensuse
Published
2025-08-26 00:00
Modified
2025-08-26 00:00
Summary
fractal-12.0-3.1 on GA media
Notes
Title of the patch
fractal-12.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the fractal-12.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15492
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "fractal-12.0-3.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the fractal-12.0-3.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15492", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15492-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "fractal-12.0-3.1 on GA media", "tracking": { "current_release_date": "2025-08-26T00:00:00Z", "generator": { "date": "2025-08-26T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15492-1", "initial_release_date": "2025-08-26T00:00:00Z", "revision_history": [ { "date": "2025-08-26T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "fractal-12.0-3.1.aarch64", "product": { "name": "fractal-12.0-3.1.aarch64", "product_id": "fractal-12.0-3.1.aarch64" } }, { "category": "product_version", "name": "fractal-lang-12.0-3.1.aarch64", "product": { "name": "fractal-lang-12.0-3.1.aarch64", "product_id": "fractal-lang-12.0-3.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "fractal-12.0-3.1.ppc64le", "product": { "name": "fractal-12.0-3.1.ppc64le", "product_id": "fractal-12.0-3.1.ppc64le" } }, { "category": "product_version", "name": "fractal-lang-12.0-3.1.ppc64le", "product": { "name": "fractal-lang-12.0-3.1.ppc64le", "product_id": "fractal-lang-12.0-3.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "fractal-12.0-3.1.s390x", "product": { "name": "fractal-12.0-3.1.s390x", "product_id": "fractal-12.0-3.1.s390x" } }, { "category": "product_version", "name": "fractal-lang-12.0-3.1.s390x", "product": { "name": "fractal-lang-12.0-3.1.s390x", "product_id": "fractal-lang-12.0-3.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "fractal-12.0-3.1.x86_64", "product": { "name": "fractal-12.0-3.1.x86_64", "product_id": "fractal-12.0-3.1.x86_64" } }, { "category": "product_version", "name": "fractal-lang-12.0-3.1.x86_64", "product": { "name": "fractal-lang-12.0-3.1.x86_64", "product_id": "fractal-lang-12.0-3.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "fractal-12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.aarch64" }, "product_reference": "fractal-12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le" }, "product_reference": "fractal-12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.s390x" }, "product_reference": "fractal-12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.x86_64" }, "product_reference": "fractal-12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-lang-12.0-3.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64" }, "product_reference": "fractal-lang-12.0-3.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-lang-12.0-3.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le" }, "product_reference": "fractal-lang-12.0-3.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-lang-12.0-3.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x" }, "product_reference": "fractal-lang-12.0-3.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "fractal-lang-12.0-3.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64" }, "product_reference": "fractal-lang-12.0-3.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:fractal-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-12.0-3.1.x86_64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:fractal-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-12.0-3.1.x86_64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:fractal-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-12.0-3.1.x86_64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x", "openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-26T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15497-1
Vulnerability from csaf_opensuse
Published
2025-08-27 00:00
Modified
2025-08-27 00:00
Summary
scx-1.0.15-2.1 on GA media
Notes
Title of the patch
scx-1.0.15-2.1 on GA media
Description of the patch
These are all security issues fixed in the scx-1.0.15-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15497
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "scx-1.0.15-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the scx-1.0.15-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15497", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15497-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "scx-1.0.15-2.1 on GA media", "tracking": { "current_release_date": "2025-08-27T00:00:00Z", "generator": { "date": "2025-08-27T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15497-1", "initial_release_date": "2025-08-27T00:00:00Z", "revision_history": [ { "date": "2025-08-27T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "scx-1.0.15-2.1.aarch64", "product": { "name": "scx-1.0.15-2.1.aarch64", "product_id": "scx-1.0.15-2.1.aarch64" } }, { "category": "product_version", "name": "scx-devel-1.0.15-2.1.aarch64", "product": { "name": "scx-devel-1.0.15-2.1.aarch64", "product_id": "scx-devel-1.0.15-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "scx-1.0.15-2.1.ppc64le", "product": { "name": "scx-1.0.15-2.1.ppc64le", "product_id": "scx-1.0.15-2.1.ppc64le" } }, { "category": "product_version", "name": "scx-devel-1.0.15-2.1.ppc64le", "product": { "name": "scx-devel-1.0.15-2.1.ppc64le", "product_id": "scx-devel-1.0.15-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "scx-1.0.15-2.1.s390x", "product": { "name": "scx-1.0.15-2.1.s390x", "product_id": "scx-1.0.15-2.1.s390x" } }, { "category": "product_version", "name": "scx-devel-1.0.15-2.1.s390x", "product": { "name": "scx-devel-1.0.15-2.1.s390x", "product_id": "scx-devel-1.0.15-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "scx-1.0.15-2.1.x86_64", "product": { "name": "scx-1.0.15-2.1.x86_64", "product_id": "scx-1.0.15-2.1.x86_64" } }, { "category": "product_version", "name": "scx-devel-1.0.15-2.1.x86_64", "product": { "name": "scx-devel-1.0.15-2.1.x86_64", "product_id": "scx-devel-1.0.15-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "scx-1.0.15-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64" }, "product_reference": "scx-1.0.15-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-1.0.15-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le" }, "product_reference": "scx-1.0.15-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-1.0.15-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.s390x" }, "product_reference": "scx-1.0.15-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-1.0.15-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64" }, "product_reference": "scx-1.0.15-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-devel-1.0.15-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64" }, "product_reference": "scx-devel-1.0.15-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-devel-1.0.15-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le" }, "product_reference": "scx-devel-1.0.15-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-devel-1.0.15-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x" }, "product_reference": "scx-devel-1.0.15-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "scx-devel-1.0.15-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64" }, "product_reference": "scx-devel-1.0.15-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x", "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-27T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15445-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
gstreamer-devtools-1.26.5-1.1 on GA media
Notes
Title of the patch
gstreamer-devtools-1.26.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the gstreamer-devtools-1.26.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15445
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "gstreamer-devtools-1.26.5-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the gstreamer-devtools-1.26.5-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15445", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15445-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "gstreamer-devtools-1.26.5-1.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15445-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gstreamer-devtools-1.26.5-1.1.aarch64", "product": { "name": "gstreamer-devtools-1.26.5-1.1.aarch64", "product_id": "gstreamer-devtools-1.26.5-1.1.aarch64" } }, { "category": "product_version", "name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64", "product": { "name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64", "product_id": "gstreamer-devtools-devel-1.26.5-1.1.aarch64" } }, { "category": "product_version", "name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "product": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "product_id": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64" } }, { "category": "product_version", "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "product": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gstreamer-devtools-1.26.5-1.1.ppc64le", "product": { "name": "gstreamer-devtools-1.26.5-1.1.ppc64le", "product_id": "gstreamer-devtools-1.26.5-1.1.ppc64le" } }, { "category": "product_version", "name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "product": { "name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "product_id": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le" } }, { "category": "product_version", "name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "product": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "product_id": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le" } }, { "category": "product_version", "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "product": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gstreamer-devtools-1.26.5-1.1.s390x", "product": { "name": "gstreamer-devtools-1.26.5-1.1.s390x", "product_id": "gstreamer-devtools-1.26.5-1.1.s390x" } }, { "category": "product_version", "name": "gstreamer-devtools-devel-1.26.5-1.1.s390x", "product": { "name": "gstreamer-devtools-devel-1.26.5-1.1.s390x", "product_id": "gstreamer-devtools-devel-1.26.5-1.1.s390x" } }, { "category": "product_version", "name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x", "product": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x", "product_id": "libgstvalidate-1_0-0-1.26.5-1.1.s390x" } }, { "category": "product_version", "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "product": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gstreamer-devtools-1.26.5-1.1.x86_64", "product": { "name": "gstreamer-devtools-1.26.5-1.1.x86_64", "product_id": "gstreamer-devtools-1.26.5-1.1.x86_64" } }, { "category": "product_version", "name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64", "product": { "name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64", "product_id": "gstreamer-devtools-devel-1.26.5-1.1.x86_64" } }, { "category": "product_version", "name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "product": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "product_id": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64" } }, { "category": "product_version", "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64", "product": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64", "product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64" }, "product_reference": "gstreamer-devtools-1.26.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le" }, "product_reference": "gstreamer-devtools-1.26.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-1.26.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x" }, "product_reference": "gstreamer-devtools-1.26.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64" }, "product_reference": "gstreamer-devtools-1.26.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64" }, "product_reference": "gstreamer-devtools-devel-1.26.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le" }, "product_reference": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-devel-1.26.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x" }, "product_reference": "gstreamer-devtools-devel-1.26.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64" }, "product_reference": "gstreamer-devtools-devel-1.26.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64" }, "product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le" }, "product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x" }, "product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64" }, "product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64" }, "product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le" }, "product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x" }, "product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64" }, "product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x", "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x", "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15480-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
keylime-ima-policy-0.2.8+12-1.1 on GA media
Notes
Title of the patch
keylime-ima-policy-0.2.8+12-1.1 on GA media
Description of the patch
These are all security issues fixed in the keylime-ima-policy-0.2.8+12-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15480
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "keylime-ima-policy-0.2.8+12-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the keylime-ima-policy-0.2.8+12-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15480", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15480-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "keylime-ima-policy-0.2.8+12-1.1 on GA media", "tracking": { "current_release_date": "2025-08-21T00:00:00Z", "generator": { "date": "2025-08-21T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15480-1", "initial_release_date": "2025-08-21T00:00:00Z", "revision_history": [ { "date": "2025-08-21T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-1.1.aarch64", "product": { "name": "keylime-ima-policy-0.2.8+12-1.1.aarch64", "product_id": "keylime-ima-policy-0.2.8+12-1.1.aarch64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-1.1.aarch64", "product": { "name": "rust-keylime-0.2.8+12-1.1.aarch64", "product_id": "rust-keylime-0.2.8+12-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le", "product": { "name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le", "product_id": "keylime-ima-policy-0.2.8+12-1.1.ppc64le" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-1.1.ppc64le", "product": { "name": "rust-keylime-0.2.8+12-1.1.ppc64le", "product_id": "rust-keylime-0.2.8+12-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-1.1.s390x", "product": { "name": "keylime-ima-policy-0.2.8+12-1.1.s390x", "product_id": "keylime-ima-policy-0.2.8+12-1.1.s390x" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-1.1.s390x", "product": { "name": "rust-keylime-0.2.8+12-1.1.s390x", "product_id": "rust-keylime-0.2.8+12-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-1.1.x86_64", "product": { "name": "keylime-ima-policy-0.2.8+12-1.1.x86_64", "product_id": "keylime-ima-policy-0.2.8+12-1.1.x86_64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-1.1.x86_64", "product": { "name": "rust-keylime-0.2.8+12-1.1.x86_64", "product_id": "rust-keylime-0.2.8+12-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "keylime-ima-policy-0.2.8+12-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64" }, "product_reference": "keylime-ima-policy-0.2.8+12-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le" }, "product_reference": "keylime-ima-policy-0.2.8+12-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "keylime-ima-policy-0.2.8+12-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x" }, "product_reference": "keylime-ima-policy-0.2.8+12-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "keylime-ima-policy-0.2.8+12-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64" }, "product_reference": "keylime-ima-policy-0.2.8+12-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64" }, "product_reference": "rust-keylime-0.2.8+12-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le" }, "product_reference": "rust-keylime-0.2.8+12-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x" }, "product_reference": "rust-keylime-0.2.8+12-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64" }, "product_reference": "rust-keylime-0.2.8+12-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x", "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-21T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15471-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
ImageMagick-7.1.2.1-1.1 on GA media
Notes
Title of the patch
ImageMagick-7.1.2.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the ImageMagick-7.1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15471
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "ImageMagick-7.1.2.1-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the ImageMagick-7.1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15471", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15471-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55154 page", "url": "https://www.suse.com/security/cve/CVE-2025-55154/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55160 page", "url": "https://www.suse.com/security/cve/CVE-2025-55160/" } ], "title": "ImageMagick-7.1.2.1-1.1 on GA media", "tracking": { "current_release_date": "2025-08-21T00:00:00Z", "generator": { "date": "2025-08-21T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15471-1", "initial_release_date": "2025-08-21T00:00:00Z", "revision_history": [ { "date": "2025-08-21T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "ImageMagick-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "ImageMagick-devel-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-devel-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-devel-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "ImageMagick-doc-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-doc-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-doc-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "ImageMagick-extra-7.1.2.1-1.1.aarch64", "product": { "name": "ImageMagick-extra-7.1.2.1-1.1.aarch64", "product_id": "ImageMagick-extra-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "product": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "product": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagick++-devel-7.1.2.1-1.1.aarch64", "product": { "name": "libMagick++-devel-7.1.2.1-1.1.aarch64", "product_id": "libMagick++-devel-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "product": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "product": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "product": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "product": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "product": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64" } }, { "category": "product_version", "name": "perl-PerlMagick-7.1.2.1-1.1.aarch64", "product": { "name": "perl-PerlMagick-7.1.2.1-1.1.aarch64", "product_id": "perl-PerlMagick-7.1.2.1-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "ImageMagick-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-devel-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-doc-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le", "product": { "name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le", "product_id": "ImageMagick-extra-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagick++-devel-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagick++-devel-7.1.2.1-1.1.ppc64le", "product_id": "libMagick++-devel-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "product": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le" } }, { "category": "product_version", "name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le", "product": { "name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le", "product_id": "perl-PerlMagick-7.1.2.1-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "ImageMagick-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "ImageMagick-devel-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-devel-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-devel-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "ImageMagick-doc-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-doc-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-doc-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "ImageMagick-extra-7.1.2.1-1.1.s390x", "product": { "name": "ImageMagick-extra-7.1.2.1-1.1.s390x", "product_id": "ImageMagick-extra-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "product": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "product": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagick++-devel-7.1.2.1-1.1.s390x", "product": { "name": "libMagick++-devel-7.1.2.1-1.1.s390x", "product_id": "libMagick++-devel-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "product": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "product": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "product": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "product": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "product": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x" } }, { "category": "product_version", "name": "perl-PerlMagick-7.1.2.1-1.1.s390x", "product": { "name": "perl-PerlMagick-7.1.2.1-1.1.s390x", "product_id": "perl-PerlMagick-7.1.2.1-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "ImageMagick-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "ImageMagick-devel-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-devel-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-devel-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "ImageMagick-doc-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-doc-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-doc-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "ImageMagick-extra-7.1.2.1-1.1.x86_64", "product": { "name": "ImageMagick-extra-7.1.2.1-1.1.x86_64", "product_id": "ImageMagick-extra-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "product": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "product": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagick++-devel-7.1.2.1-1.1.x86_64", "product": { "name": "libMagick++-devel-7.1.2.1-1.1.x86_64", "product_id": "libMagick++-devel-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "product": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "product": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "product": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "product": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "product": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64" } }, { "category": "product_version", "name": "perl-PerlMagick-7.1.2.1-1.1.x86_64", "product": { "name": "perl-PerlMagick-7.1.2.1-1.1.x86_64", "product_id": "perl-PerlMagick-7.1.2.1-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-devel-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-devel-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-devel-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-devel-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-doc-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-doc-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-doc-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-doc-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-doc-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-doc-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-doc-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-extra-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64" }, "product_reference": "ImageMagick-extra-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le" }, "product_reference": "ImageMagick-extra-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-extra-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x" }, "product_reference": "ImageMagick-extra-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "ImageMagick-extra-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64" }, "product_reference": "ImageMagick-extra-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x" }, "product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x" }, "product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagick++-devel-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagick++-devel-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x" }, "product_reference": "libMagick++-devel-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagick++-devel-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x" }, "product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x" }, "product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x" }, "product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x" }, "product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64" }, "product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le" }, "product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x" }, "product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64" }, "product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-PerlMagick-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64" }, "product_reference": "perl-PerlMagick-7.1.2.1-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le" }, "product_reference": "perl-PerlMagick-7.1.2.1-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-PerlMagick-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x" }, "product_reference": "perl-PerlMagick-7.1.2.1-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "perl-PerlMagick-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" }, "product_reference": "perl-PerlMagick-7.1.2.1-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55154", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55154" } ], "notes": [ { "category": "general", "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55154", "url": "https://www.suse.com/security/cve/CVE-2025-55154" }, { "category": "external", "summary": "SUSE Bug 1248078 for CVE-2025-55154", "url": "https://bugzilla.suse.com/1248078" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-21T00:00:00Z", "details": "important" } ], "title": "CVE-2025-55154" }, { "cve": "CVE-2025-55160", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55160" } ], "notes": [ { "category": "general", "text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, there is undefined behavior (function-type-mismatch) in splay tree cloning callback. This results in a deterministic abort under UBSan (DoS in sanitizer builds), with no crash in a non-sanitized build. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55160", "url": "https://www.suse.com/security/cve/CVE-2025-55160" }, { "category": "external", "summary": "SUSE Bug 1248079 for CVE-2025-55160", "url": "https://bugzilla.suse.com/1248079" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x", "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-21T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55160" } ] }
opensuse-su-2025:15446-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media
Notes
Title of the patch
gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media
Description of the patch
These are all security issues fixed in the gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15446
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15446", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15446-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15446-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "product": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64" } }, { "category": "product_version", "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "product": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "product": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le" } }, { "category": "product_version", "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "product": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "product": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x" } }, { "category": "product_version", "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "product": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "product": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64" } }, { "category": "product_version", "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64", "product": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64", "product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64" }, "product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le" }, "product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x" }, "product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64" }, "product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64" }, "product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le" }, "product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x" }, "product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64" }, "product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x", "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15475-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
flake-pilot-3.1.21-1.1 on GA media
Notes
Title of the patch
flake-pilot-3.1.21-1.1 on GA media
Description of the patch
These are all security issues fixed in the flake-pilot-3.1.21-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15475
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "flake-pilot-3.1.21-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the flake-pilot-3.1.21-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15475", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15475-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "flake-pilot-3.1.21-1.1 on GA media", "tracking": { "current_release_date": "2025-08-21T00:00:00Z", "generator": { "date": "2025-08-21T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15475-1", "initial_release_date": "2025-08-21T00:00:00Z", "revision_history": [ { "date": "2025-08-21T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "flake-pilot-3.1.21-1.1.aarch64", "product": { "name": "flake-pilot-3.1.21-1.1.aarch64", "product_id": "flake-pilot-3.1.21-1.1.aarch64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-3.1.21-1.1.aarch64", "product": { "name": "flake-pilot-firecracker-3.1.21-1.1.aarch64", "product_id": "flake-pilot-firecracker-3.1.21-1.1.aarch64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "product": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "product": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64" } }, { "category": "product_version", "name": "flake-pilot-podman-3.1.21-1.1.aarch64", "product": { "name": "flake-pilot-podman-3.1.21-1.1.aarch64", "product_id": "flake-pilot-podman-3.1.21-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "flake-pilot-3.1.21-1.1.ppc64le", "product": { "name": "flake-pilot-3.1.21-1.1.ppc64le", "product_id": "flake-pilot-3.1.21-1.1.ppc64le" } }, { "category": "product_version", "name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le", "product": { "name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le", "product_id": "flake-pilot-firecracker-3.1.21-1.1.ppc64le" } }, { "category": "product_version", "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "product": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le" } }, { "category": "product_version", "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "product": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le" } }, { "category": "product_version", "name": "flake-pilot-podman-3.1.21-1.1.ppc64le", "product": { "name": "flake-pilot-podman-3.1.21-1.1.ppc64le", "product_id": "flake-pilot-podman-3.1.21-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "flake-pilot-3.1.21-1.1.s390x", "product": { "name": "flake-pilot-3.1.21-1.1.s390x", "product_id": "flake-pilot-3.1.21-1.1.s390x" } }, { "category": "product_version", "name": "flake-pilot-firecracker-3.1.21-1.1.s390x", "product": { "name": "flake-pilot-firecracker-3.1.21-1.1.s390x", "product_id": "flake-pilot-firecracker-3.1.21-1.1.s390x" } }, { "category": "product_version", "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "product": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x" } }, { "category": "product_version", "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "product": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x" } }, { "category": "product_version", "name": "flake-pilot-podman-3.1.21-1.1.s390x", "product": { "name": "flake-pilot-podman-3.1.21-1.1.s390x", "product_id": "flake-pilot-podman-3.1.21-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "flake-pilot-3.1.21-1.1.x86_64", "product": { "name": "flake-pilot-3.1.21-1.1.x86_64", "product_id": "flake-pilot-3.1.21-1.1.x86_64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-3.1.21-1.1.x86_64", "product": { "name": "flake-pilot-firecracker-3.1.21-1.1.x86_64", "product_id": "flake-pilot-firecracker-3.1.21-1.1.x86_64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "product": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64" } }, { "category": "product_version", "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "product": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64" } }, { "category": "product_version", "name": "flake-pilot-podman-3.1.21-1.1.x86_64", "product": { "name": "flake-pilot-podman-3.1.21-1.1.x86_64", "product_id": "flake-pilot-podman-3.1.21-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64" }, "product_reference": "flake-pilot-3.1.21-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le" }, "product_reference": "flake-pilot-3.1.21-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-3.1.21-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x" }, "product_reference": "flake-pilot-3.1.21-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64" }, "product_reference": "flake-pilot-3.1.21-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64" }, "product_reference": "flake-pilot-firecracker-3.1.21-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le" }, "product_reference": "flake-pilot-firecracker-3.1.21-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-3.1.21-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x" }, "product_reference": "flake-pilot-firecracker-3.1.21-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64" }, "product_reference": "flake-pilot-firecracker-3.1.21-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64" }, "product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le" }, "product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x" }, "product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64" }, "product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64" }, "product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le" }, "product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x" }, "product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64" }, "product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-podman-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64" }, "product_reference": "flake-pilot-podman-3.1.21-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-podman-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le" }, "product_reference": "flake-pilot-podman-3.1.21-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-podman-3.1.21-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x" }, "product_reference": "flake-pilot-podman-3.1.21-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "flake-pilot-podman-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64" }, "product_reference": "flake-pilot-podman-3.1.21-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x", "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-21T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
opensuse-su-2025:15444-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
framework_tool-0.4.5-2.1 on GA media
Notes
Title of the patch
framework_tool-0.4.5-2.1 on GA media
Description of the patch
These are all security issues fixed in the framework_tool-0.4.5-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15444
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "framework_tool-0.4.5-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the framework_tool-0.4.5-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15444", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15444-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "framework_tool-0.4.5-2.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15444-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "framework_tool-0.4.5-2.1.aarch64", "product": { "name": "framework_tool-0.4.5-2.1.aarch64", "product_id": "framework_tool-0.4.5-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "framework_tool-0.4.5-2.1.ppc64le", "product": { "name": "framework_tool-0.4.5-2.1.ppc64le", "product_id": "framework_tool-0.4.5-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "framework_tool-0.4.5-2.1.s390x", "product": { "name": "framework_tool-0.4.5-2.1.s390x", "product_id": "framework_tool-0.4.5-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "framework_tool-0.4.5-2.1.x86_64", "product": { "name": "framework_tool-0.4.5-2.1.x86_64", "product_id": "framework_tool-0.4.5-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "framework_tool-0.4.5-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64" }, "product_reference": "framework_tool-0.4.5-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "framework_tool-0.4.5-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le" }, "product_reference": "framework_tool-0.4.5-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "framework_tool-0.4.5-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x" }, "product_reference": "framework_tool-0.4.5-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "framework_tool-0.4.5-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64" }, "product_reference": "framework_tool-0.4.5-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x", "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
suse-su-2025:02962-1
Vulnerability from csaf_suse
Published
2025-08-22 12:50
Modified
2025-08-22 12:50
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update slab to version 0.4.11:
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
Patchnames
SUSE-2025-2962,SUSE-SLE-Micro-5.5-2025-2962
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust-keylime", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust-keylime fixes the following issues:\n\n- Update slab to version 0.4.11:\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2962,SUSE-SLE-Micro-5.5-2025-2962", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02962-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02962-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502962-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02962-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041342.html" }, { "category": "self", "summary": "SUSE Bug 1248006", "url": "https://bugzilla.suse.com/1248006" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "Security update for rust-keylime", "tracking": { "current_release_date": "2025-08-22T12:50:26Z", "generator": { "date": "2025-08-22T12:50:26Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02962-1", "initial_release_date": "2025-08-22T12:50:26Z", "revision_history": [ { "date": "2025-08-22T12:50:26Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64", "product": { "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64", "product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "product": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "product_id": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le", "product": { "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le", "product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "product": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "product_id": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x", "product": { "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x", "product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x", "product": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x", "product_id": "rust-keylime-0.2.8+12-150500.3.8.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64", "product": { "name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64", "product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64", "product": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64", "product_id": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.5", "product": { "name": "SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.5" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64" }, "product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le" }, "product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x" }, "product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5", "product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64" }, "product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x", "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-22T12:50:26Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
suse-su-2025:02957-1
Vulnerability from csaf_suse
Published
2025-08-22 07:56
Modified
2025-08-22 07:56
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update slab to version 0.4.11:
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
Patchnames
SUSE-2025-2957,SUSE-SLE-Micro-5.3-2025-2957
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for rust-keylime", "title": "Title of the patch" }, { "category": "description", "text": "This update for rust-keylime fixes the following issues:\n\n- Update slab to version 0.4.11:\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-2957,SUSE-SLE-Micro-5.3-2025-2957", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02957-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:02957-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502957-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:02957-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041333.html" }, { "category": "self", "summary": "SUSE Bug 1248006", "url": "https://bugzilla.suse.com/1248006" }, { "category": "self", "summary": "SUSE CVE CVE-2025-55159 page", "url": "https://www.suse.com/security/cve/CVE-2025-55159/" } ], "title": "Security update for rust-keylime", "tracking": { "current_release_date": "2025-08-22T07:56:12Z", "generator": { "date": "2025-08-22T07:56:12Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:02957-1", "initial_release_date": "2025-08-22T07:56:12Z", "revision_history": [ { "date": "2025-08-22T07:56:12Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64", "product": { "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64", "product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "product": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "product_id": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le", "product": { "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le", "product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le", "product": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le", "product_id": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x", "product": { "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x", "product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x", "product": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x", "product_id": "rust-keylime-0.2.8+12-150400.3.10.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64", "product": { "name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64", "product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64" } }, { "category": "product_version", "name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64", "product": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64", "product_id": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Micro 5.3", "product": { "name": "SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-micro:5.3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64" }, "product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x" }, "product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" }, { "category": "default_component_of", "full_product_name": { "name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3", "product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64" }, "product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-55159", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-55159" } ], "notes": [ { "category": "general", "text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-55159", "url": "https://www.suse.com/security/cve/CVE-2025-55159" }, { "category": "external", "summary": "SUSE Bug 1248000 for CVE-2025-55159", "url": "https://bugzilla.suse.com/1248000" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x", "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-22T07:56:12Z", "details": "moderate" } ], "title": "CVE-2025-55159" } ] }
fkie_cve-2025-55159
Vulnerability from fkie_nvd
Published
2025-08-11 23:15
Modified
2025-08-12 14:25
Severity ?
Summary
slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
References
Impacted products
Vendor | Product | Version |
---|
{ "cveTags": [], "descriptions": [ { "lang": "en", "value": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length." }, { "lang": "es", "value": "slab es un almacenamiento preasignado para un tipo de dato uniforme. En la versi\u00f3n 0.4.10, el m\u00e9todo get_disjoint_mut verificaba incorrectamente si los \u00edndices estaban dentro de la capacidad del slab en lugar de su longitud, lo que permit\u00eda acceder a memoria no inicializada. Esto pod\u00eda provocar un comportamiento indefinido o posibles fallos. Esto se ha corregido en slab 0.4.11. Una soluci\u00f3n alternativa consiste en evitar el uso de get_disjoint_mut con \u00edndices que puedan superar la longitud real del slab." } ], "id": "CVE-2025-55159", "lastModified": "2025-08-12T14:25:33.177", "metrics": { "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 5.1, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "NONE", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "security-advisories@github.com", "type": "Secondary" } ] }, "published": "2025-08-11T23:15:28.173", "references": [ { "source": "security-advisories@github.com", "url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8" }, { "source": "security-advisories@github.com", "url": "https://github.com/tokio-rs/slab/pull/152" }, { "source": "security-advisories@github.com", "url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv" } ], "sourceIdentifier": "security-advisories@github.com", "vulnStatus": "Awaiting Analysis", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "security-advisories@github.com", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…