Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-55159 (GCVE-0-2025-55159)
Vulnerability from cvelistv5
Published
2025-08-11 23:00
Modified
2025-08-12 14:07
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
Summary
slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
References
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-55159",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-08-12T14:06:53.117320Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-08-12T14:07:00.276Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "slab",
"vendor": "tokio-rs",
"versions": [
{
"status": "affected",
"version": "\u003e= 0.4.10, \u003c 0.4.11"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length."
}
],
"metrics": [
{
"cvssV4_0": {
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"privilegesRequired": "NONE",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-08-11T23:00:58.915Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv"
},
{
"name": "https://github.com/tokio-rs/slab/pull/152",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tokio-rs/slab/pull/152"
},
{
"name": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8"
}
],
"source": {
"advisory": "GHSA-qx2v-8332-m4fv",
"discovery": "UNKNOWN"
},
"title": "slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-55159",
"datePublished": "2025-08-11T23:00:58.915Z",
"dateReserved": "2025-08-07T18:27:23.306Z",
"dateUpdated": "2025-08-12T14:07:00.276Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-55159\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-08-11T23:15:28.173\",\"lastModified\":\"2025-08-12T14:25:33.177\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.\"},{\"lang\":\"es\",\"value\":\"slab es un almacenamiento preasignado para un tipo de dato uniforme. En la versi\u00f3n 0.4.10, el m\u00e9todo get_disjoint_mut verificaba incorrectamente si los \u00edndices estaban dentro de la capacidad del slab en lugar de su longitud, lo que permit\u00eda acceder a memoria no inicializada. Esto pod\u00eda provocar un comportamiento indefinido o posibles fallos. Esto se ha corregido en slab 0.4.11. Una soluci\u00f3n alternativa consiste en evitar el uso de get_disjoint_mut con \u00edndices que puedan superar la longitud real del slab.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":5.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"NONE\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"references\":[{\"url\":\"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/tokio-rs/slab/pull/152\",\"source\":\"security-advisories@github.com\"},{\"url\":\"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\",\"source\":\"security-advisories@github.com\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-55159\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-12T14:06:53.117320Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-12T14:06:55.485Z\"}}], \"cna\": {\"title\": \"slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check\", \"source\": {\"advisory\": \"GHSA-qx2v-8332-m4fv\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 5.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"NONE\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"NONE\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"NONE\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"tokio-rs\", \"product\": \"slab\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003e= 0.4.10, \u003c 0.4.11\"}]}], \"references\": [{\"url\": \"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\", \"name\": \"https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/tokio-rs/slab/pull/152\", \"name\": \"https://github.com/tokio-rs/slab/pull/152\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\", \"name\": \"https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-08-11T23:00:58.915Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-55159\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-12T14:07:00.276Z\", \"dateReserved\": \"2025-08-07T18:27:23.306Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-08-11T23:00:58.915Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
opensuse-su-2025:15554-1
Vulnerability from csaf_opensuse
Published
2025-09-15 00:00
Modified
2025-09-15 00:00
Summary
watchexec-2.3.2-2.1 on GA media
Notes
Title of the patch
watchexec-2.3.2-2.1 on GA media
Description of the patch
These are all security issues fixed in the watchexec-2.3.2-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15554
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "watchexec-2.3.2-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the watchexec-2.3.2-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15554",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15554-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "watchexec-2.3.2-2.1 on GA media",
"tracking": {
"current_release_date": "2025-09-15T00:00:00Z",
"generator": {
"date": "2025-09-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15554-1",
"initial_release_date": "2025-09-15T00:00:00Z",
"revision_history": [
{
"date": "2025-09-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "watchexec-2.3.2-2.1.aarch64",
"product": {
"name": "watchexec-2.3.2-2.1.aarch64",
"product_id": "watchexec-2.3.2-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "watchexec-2.3.2-2.1.ppc64le",
"product": {
"name": "watchexec-2.3.2-2.1.ppc64le",
"product_id": "watchexec-2.3.2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "watchexec-2.3.2-2.1.s390x",
"product": {
"name": "watchexec-2.3.2-2.1.s390x",
"product_id": "watchexec-2.3.2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "watchexec-2.3.2-2.1.x86_64",
"product": {
"name": "watchexec-2.3.2-2.1.x86_64",
"product_id": "watchexec-2.3.2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "watchexec-2.3.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64"
},
"product_reference": "watchexec-2.3.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "watchexec-2.3.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le"
},
"product_reference": "watchexec-2.3.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "watchexec-2.3.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x"
},
"product_reference": "watchexec-2.3.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "watchexec-2.3.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64"
},
"product_reference": "watchexec-2.3.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.aarch64",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.ppc64le",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.s390x",
"openSUSE Tumbleweed:watchexec-2.3.2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15447-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
jasper-4.2.8-2.1 on GA media
Notes
Title of the patch
jasper-4.2.8-2.1 on GA media
Description of the patch
These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15447
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "jasper-4.2.8-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15447",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15447-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8835 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8835/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8836 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8836/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8837 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8837/"
}
],
"title": "jasper-4.2.8-2.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15447-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "jasper-4.2.8-2.1.aarch64",
"product": {
"name": "jasper-4.2.8-2.1.aarch64",
"product_id": "jasper-4.2.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper-devel-4.2.8-2.1.aarch64",
"product": {
"name": "libjasper-devel-4.2.8-2.1.aarch64",
"product_id": "libjasper-devel-4.2.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper7-4.2.8-2.1.aarch64",
"product": {
"name": "libjasper7-4.2.8-2.1.aarch64",
"product_id": "libjasper7-4.2.8-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "libjasper7-32bit-4.2.8-2.1.aarch64",
"product": {
"name": "libjasper7-32bit-4.2.8-2.1.aarch64",
"product_id": "libjasper7-32bit-4.2.8-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-4.2.8-2.1.ppc64le",
"product": {
"name": "jasper-4.2.8-2.1.ppc64le",
"product_id": "jasper-4.2.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper-devel-4.2.8-2.1.ppc64le",
"product": {
"name": "libjasper-devel-4.2.8-2.1.ppc64le",
"product_id": "libjasper-devel-4.2.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper7-4.2.8-2.1.ppc64le",
"product": {
"name": "libjasper7-4.2.8-2.1.ppc64le",
"product_id": "libjasper7-4.2.8-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libjasper7-32bit-4.2.8-2.1.ppc64le",
"product": {
"name": "libjasper7-32bit-4.2.8-2.1.ppc64le",
"product_id": "libjasper7-32bit-4.2.8-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-4.2.8-2.1.s390x",
"product": {
"name": "jasper-4.2.8-2.1.s390x",
"product_id": "jasper-4.2.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper-devel-4.2.8-2.1.s390x",
"product": {
"name": "libjasper-devel-4.2.8-2.1.s390x",
"product_id": "libjasper-devel-4.2.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper7-4.2.8-2.1.s390x",
"product": {
"name": "libjasper7-4.2.8-2.1.s390x",
"product_id": "libjasper7-4.2.8-2.1.s390x"
}
},
{
"category": "product_version",
"name": "libjasper7-32bit-4.2.8-2.1.s390x",
"product": {
"name": "libjasper7-32bit-4.2.8-2.1.s390x",
"product_id": "libjasper7-32bit-4.2.8-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "jasper-4.2.8-2.1.x86_64",
"product": {
"name": "jasper-4.2.8-2.1.x86_64",
"product_id": "jasper-4.2.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper-devel-4.2.8-2.1.x86_64",
"product": {
"name": "libjasper-devel-4.2.8-2.1.x86_64",
"product_id": "libjasper-devel-4.2.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper7-4.2.8-2.1.x86_64",
"product": {
"name": "libjasper7-4.2.8-2.1.x86_64",
"product_id": "libjasper7-4.2.8-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "libjasper7-32bit-4.2.8-2.1.x86_64",
"product": {
"name": "libjasper7-32bit-4.2.8-2.1.x86_64",
"product_id": "libjasper7-32bit-4.2.8-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64"
},
"product_reference": "jasper-4.2.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le"
},
"product_reference": "jasper-4.2.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-4.2.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x"
},
"product_reference": "jasper-4.2.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "jasper-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64"
},
"product_reference": "jasper-4.2.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64"
},
"product_reference": "libjasper-devel-4.2.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le"
},
"product_reference": "libjasper-devel-4.2.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-4.2.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x"
},
"product_reference": "libjasper-devel-4.2.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper-devel-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64"
},
"product_reference": "libjasper-devel-4.2.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64"
},
"product_reference": "libjasper7-4.2.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le"
},
"product_reference": "libjasper7-4.2.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-4.2.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x"
},
"product_reference": "libjasper7-4.2.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
},
"product_reference": "libjasper7-4.2.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-32bit-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64"
},
"product_reference": "libjasper7-32bit-4.2.8-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-32bit-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le"
},
"product_reference": "libjasper7-32bit-4.2.8-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-32bit-4.2.8-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x"
},
"product_reference": "libjasper7-32bit-4.2.8-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libjasper7-32bit-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64"
},
"product_reference": "libjasper7-32bit-4.2.8-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8835",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8835"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8835",
"url": "https://www.suse.com/security/cve/CVE-2025-8835"
},
{
"category": "external",
"summary": "SUSE Bug 1247904 for CVE-2025-8835",
"url": "https://bugzilla.suse.com/1247904"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8835"
},
{
"cve": "CVE-2025-8836",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8836"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8836",
"url": "https://www.suse.com/security/cve/CVE-2025-8836"
},
{
"category": "external",
"summary": "SUSE Bug 1247902 for CVE-2025-8836",
"url": "https://bugzilla.suse.com/1247902"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.5,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-8836"
},
{
"cve": "CVE-2025-8837",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8837"
}
],
"notes": [
{
"category": "general",
"text": "A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8837",
"url": "https://www.suse.com/security/cve/CVE-2025-8837"
},
{
"category": "external",
"summary": "SUSE Bug 1247901 for CVE-2025-8837",
"url": "https://bugzilla.suse.com/1247901"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.6,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x",
"openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8837"
}
]
}
opensuse-su-2025:15471-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
ImageMagick-7.1.2.1-1.1 on GA media
Notes
Title of the patch
ImageMagick-7.1.2.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the ImageMagick-7.1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15471
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "ImageMagick-7.1.2.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the ImageMagick-7.1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15471",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15471-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55154 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55154/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55160 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55160/"
}
],
"title": "ImageMagick-7.1.2.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-21T00:00:00Z",
"generator": {
"date": "2025-08-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15471-1",
"initial_release_date": "2025-08-21T00:00:00Z",
"revision_history": [
{
"date": "2025-08-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "ImageMagick-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-devel-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-devel-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ImageMagick-doc-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-doc-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-doc-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "ImageMagick-extra-7.1.2.1-1.1.aarch64",
"product": {
"name": "ImageMagick-extra-7.1.2.1-1.1.aarch64",
"product_id": "ImageMagick-extra-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagick++-devel-7.1.2.1-1.1.aarch64",
"product_id": "libMagick++-devel-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"product": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "perl-PerlMagick-7.1.2.1-1.1.aarch64",
"product": {
"name": "perl-PerlMagick-7.1.2.1-1.1.aarch64",
"product_id": "perl-PerlMagick-7.1.2.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "ImageMagick-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-devel-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-doc-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"product": {
"name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"product_id": "ImageMagick-extra-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagick++-devel-7.1.2.1-1.1.ppc64le",
"product_id": "libMagick++-devel-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"product": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"product": {
"name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"product_id": "perl-PerlMagick-7.1.2.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "ImageMagick-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-devel-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-devel-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ImageMagick-doc-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-doc-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-doc-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "ImageMagick-extra-7.1.2.1-1.1.s390x",
"product": {
"name": "ImageMagick-extra-7.1.2.1-1.1.s390x",
"product_id": "ImageMagick-extra-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagick++-devel-7.1.2.1-1.1.s390x",
"product_id": "libMagick++-devel-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"product": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "perl-PerlMagick-7.1.2.1-1.1.s390x",
"product": {
"name": "perl-PerlMagick-7.1.2.1-1.1.s390x",
"product_id": "perl-PerlMagick-7.1.2.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "ImageMagick-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-devel-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-devel-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ImageMagick-doc-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-doc-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-doc-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "ImageMagick-extra-7.1.2.1-1.1.x86_64",
"product": {
"name": "ImageMagick-extra-7.1.2.1-1.1.x86_64",
"product_id": "ImageMagick-extra-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"product_id": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"product_id": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagick++-devel-7.1.2.1-1.1.x86_64",
"product_id": "libMagick++-devel-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"product_id": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"product_id": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"product_id": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"product_id": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"product": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"product_id": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "perl-PerlMagick-7.1.2.1-1.1.x86_64",
"product": {
"name": "perl-PerlMagick-7.1.2.1-1.1.x86_64",
"product_id": "perl-PerlMagick-7.1.2.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-devel-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-devel-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-devel-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-doc-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-doc-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-doc-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-doc-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-doc-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-doc-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-doc-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-extra-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64"
},
"product_reference": "ImageMagick-extra-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-extra-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le"
},
"product_reference": "ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-extra-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x"
},
"product_reference": "ImageMagick-extra-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "ImageMagick-extra-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64"
},
"product_reference": "ImageMagick-extra-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagick++-devel-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagick++-devel-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagick++-devel-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagick++-devel-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64"
},
"product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le"
},
"product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x"
},
"product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64"
},
"product_reference": "libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-PerlMagick-7.1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64"
},
"product_reference": "perl-PerlMagick-7.1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-PerlMagick-7.1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le"
},
"product_reference": "perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-PerlMagick-7.1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x"
},
"product_reference": "perl-PerlMagick-7.1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "perl-PerlMagick-7.1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
},
"product_reference": "perl-PerlMagick-7.1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55154",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55154"
}
],
"notes": [
{
"category": "general",
"text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, the magnified size calculations in ReadOneMNGIMage (in coders/png.c) are unsafe and can overflow, leading to memory corruption. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55154",
"url": "https://www.suse.com/security/cve/CVE-2025-55154"
},
{
"category": "external",
"summary": "SUSE Bug 1248078 for CVE-2025-55154",
"url": "https://bugzilla.suse.com/1248078"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-21T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-55154"
},
{
"cve": "CVE-2025-55160",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55160"
}
],
"notes": [
{
"category": "general",
"text": "ImageMagick is free and open-source software used for editing and manipulating digital images. Prior to versions 6.9.13-27 and 7.1.2-1, there is undefined behavior (function-type-mismatch) in splay tree cloning callback. This results in a deterministic abort under UBSan (DoS in sanitizer builds), with no crash in a non-sanitized build. This issue has been patched in versions 6.9.13-27 and 7.1.2-1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55160",
"url": "https://www.suse.com/security/cve/CVE-2025-55160"
},
{
"category": "external",
"summary": "SUSE Bug 1248079 for CVE-2025-55160",
"url": "https://bugzilla.suse.com/1248079"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-config-7-SUSE-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-doc-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:ImageMagick-extra-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-7_Q16HDRI5-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagick++-devel-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickCore-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-32bit-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:libMagickWand-7_Q16HDRI10-7.1.2.1-1.1.x86_64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.s390x",
"openSUSE Tumbleweed:perl-PerlMagick-7.1.2.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55160"
}
]
}
opensuse-su-2025:15445-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
gstreamer-devtools-1.26.5-1.1 on GA media
Notes
Title of the patch
gstreamer-devtools-1.26.5-1.1 on GA media
Description of the patch
These are all security issues fixed in the gstreamer-devtools-1.26.5-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15445
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gstreamer-devtools-1.26.5-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gstreamer-devtools-1.26.5-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15445",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15445-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "gstreamer-devtools-1.26.5-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15445-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-devtools-1.26.5-1.1.aarch64",
"product": {
"name": "gstreamer-devtools-1.26.5-1.1.aarch64",
"product_id": "gstreamer-devtools-1.26.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"product": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"product_id": "gstreamer-devtools-devel-1.26.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"product": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"product_id": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"product": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-devtools-1.26.5-1.1.ppc64le",
"product": {
"name": "gstreamer-devtools-1.26.5-1.1.ppc64le",
"product_id": "gstreamer-devtools-1.26.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"product": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"product_id": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"product": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"product_id": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"product": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-devtools-1.26.5-1.1.s390x",
"product": {
"name": "gstreamer-devtools-1.26.5-1.1.s390x",
"product_id": "gstreamer-devtools-1.26.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-devtools-devel-1.26.5-1.1.s390x",
"product": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.s390x",
"product_id": "gstreamer-devtools-devel-1.26.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"product": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"product_id": "libgstvalidate-1_0-0-1.26.5-1.1.s390x"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"product": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-devtools-1.26.5-1.1.x86_64",
"product": {
"name": "gstreamer-devtools-1.26.5-1.1.x86_64",
"product_id": "gstreamer-devtools-1.26.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"product": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"product_id": "gstreamer-devtools-devel-1.26.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"product": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"product_id": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64",
"product": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64",
"product_id": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64"
},
"product_reference": "gstreamer-devtools-1.26.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le"
},
"product_reference": "gstreamer-devtools-1.26.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-1.26.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x"
},
"product_reference": "gstreamer-devtools-1.26.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64"
},
"product_reference": "gstreamer-devtools-1.26.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64"
},
"product_reference": "gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le"
},
"product_reference": "gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x"
},
"product_reference": "gstreamer-devtools-devel-1.26.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-devtools-devel-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64"
},
"product_reference": "gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64"
},
"product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le"
},
"product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x"
},
"product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64"
},
"product_reference": "libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64"
},
"product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le"
},
"product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x"
},
"product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64"
},
"product_reference": "typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-devtools-devel-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:libgstvalidate-1_0-0-1.26.5-1.1.x86_64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.aarch64",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.ppc64le",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.s390x",
"openSUSE Tumbleweed:typelib-1_0-GstValidate-1_0-1.26.5-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15475-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
flake-pilot-3.1.21-1.1 on GA media
Notes
Title of the patch
flake-pilot-3.1.21-1.1 on GA media
Description of the patch
These are all security issues fixed in the flake-pilot-3.1.21-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15475
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "flake-pilot-3.1.21-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the flake-pilot-3.1.21-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15475",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15475-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "flake-pilot-3.1.21-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-21T00:00:00Z",
"generator": {
"date": "2025-08-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15475-1",
"initial_release_date": "2025-08-21T00:00:00Z",
"revision_history": [
{
"date": "2025-08-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.21-1.1.aarch64",
"product": {
"name": "flake-pilot-3.1.21-1.1.aarch64",
"product_id": "flake-pilot-3.1.21-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.21-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-3.1.21-1.1.aarch64",
"product_id": "flake-pilot-firecracker-3.1.21-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.21-1.1.aarch64",
"product": {
"name": "flake-pilot-podman-3.1.21-1.1.aarch64",
"product_id": "flake-pilot-podman-3.1.21-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.21-1.1.ppc64le",
"product": {
"name": "flake-pilot-3.1.21-1.1.ppc64le",
"product_id": "flake-pilot-3.1.21-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-3.1.21-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.21-1.1.ppc64le",
"product": {
"name": "flake-pilot-podman-3.1.21-1.1.ppc64le",
"product_id": "flake-pilot-podman-3.1.21-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.21-1.1.s390x",
"product": {
"name": "flake-pilot-3.1.21-1.1.s390x",
"product_id": "flake-pilot-3.1.21-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.21-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-3.1.21-1.1.s390x",
"product_id": "flake-pilot-firecracker-3.1.21-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.21-1.1.s390x",
"product": {
"name": "flake-pilot-podman-3.1.21-1.1.s390x",
"product_id": "flake-pilot-podman-3.1.21-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.21-1.1.x86_64",
"product": {
"name": "flake-pilot-3.1.21-1.1.x86_64",
"product_id": "flake-pilot-3.1.21-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.21-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-3.1.21-1.1.x86_64",
"product_id": "flake-pilot-firecracker-3.1.21-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.21-1.1.x86_64",
"product": {
"name": "flake-pilot-podman-3.1.21-1.1.x86_64",
"product_id": "flake-pilot-podman-3.1.21-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64"
},
"product_reference": "flake-pilot-3.1.21-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le"
},
"product_reference": "flake-pilot-3.1.21-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.21-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x"
},
"product_reference": "flake-pilot-3.1.21-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64"
},
"product_reference": "flake-pilot-3.1.21-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-3.1.21-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.21-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-3.1.21-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-3.1.21-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.21-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64"
},
"product_reference": "flake-pilot-podman-3.1.21-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.21-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le"
},
"product_reference": "flake-pilot-podman-3.1.21-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.21-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x"
},
"product_reference": "flake-pilot-podman-3.1.21-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.21-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64"
},
"product_reference": "flake-pilot-podman-3.1.21-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-dracut-netstart-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-firecracker-guestvm-tools-3.1.21-1.1.x86_64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.aarch64",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.ppc64le",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.s390x",
"openSUSE Tumbleweed:flake-pilot-podman-3.1.21-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15446-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media
Notes
Title of the patch
gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media
Description of the patch
These are all security issues fixed in the gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15446
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15446",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15446-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15446-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"product": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"product": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"product": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"product": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"product": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"product": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"product": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"product_id": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64",
"product": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64",
"product_id": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64"
},
"product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le"
},
"product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x"
},
"product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64"
},
"product_reference": "gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64"
},
"product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le"
},
"product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x"
},
"product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64"
},
"product_reference": "gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-1.26.5+git11.949807a4-1.1.x86_64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.aarch64",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.ppc64le",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.s390x",
"openSUSE Tumbleweed:gstreamer-plugins-rs-devel-1.26.5+git11.949807a4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15461-1
Vulnerability from csaf_opensuse
Published
2025-08-19 00:00
Modified
2025-08-19 00:00
Summary
aws-efs-utils-2.3.3-1.1 on GA media
Notes
Title of the patch
aws-efs-utils-2.3.3-1.1 on GA media
Description of the patch
These are all security issues fixed in the aws-efs-utils-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15461
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "aws-efs-utils-2.3.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the aws-efs-utils-2.3.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15461",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15461-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "aws-efs-utils-2.3.3-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-19T00:00:00Z",
"generator": {
"date": "2025-08-19T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15461-1",
"initial_release_date": "2025-08-19T00:00:00Z",
"revision_history": [
{
"date": "2025-08-19T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-1.1.aarch64",
"product": {
"name": "aws-efs-utils-2.3.3-1.1.aarch64",
"product_id": "aws-efs-utils-2.3.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-1.1.ppc64le",
"product": {
"name": "aws-efs-utils-2.3.3-1.1.ppc64le",
"product_id": "aws-efs-utils-2.3.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-1.1.s390x",
"product": {
"name": "aws-efs-utils-2.3.3-1.1.s390x",
"product_id": "aws-efs-utils-2.3.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-1.1.x86_64",
"product": {
"name": "aws-efs-utils-2.3.3-1.1.x86_64",
"product_id": "aws-efs-utils-2.3.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64"
},
"product_reference": "aws-efs-utils-2.3.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le"
},
"product_reference": "aws-efs-utils-2.3.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x"
},
"product_reference": "aws-efs-utils-2.3.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64"
},
"product_reference": "aws-efs-utils-2.3.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.aarch64",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.ppc64le",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.s390x",
"openSUSE Tumbleweed:aws-efs-utils-2.3.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-19T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15492-1
Vulnerability from csaf_opensuse
Published
2025-08-26 00:00
Modified
2025-08-26 00:00
Summary
fractal-12.0-3.1 on GA media
Notes
Title of the patch
fractal-12.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the fractal-12.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15492
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "fractal-12.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the fractal-12.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15492",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15492-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "fractal-12.0-3.1 on GA media",
"tracking": {
"current_release_date": "2025-08-26T00:00:00Z",
"generator": {
"date": "2025-08-26T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15492-1",
"initial_release_date": "2025-08-26T00:00:00Z",
"revision_history": [
{
"date": "2025-08-26T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "fractal-12.0-3.1.aarch64",
"product": {
"name": "fractal-12.0-3.1.aarch64",
"product_id": "fractal-12.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "fractal-lang-12.0-3.1.aarch64",
"product": {
"name": "fractal-lang-12.0-3.1.aarch64",
"product_id": "fractal-lang-12.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "fractal-12.0-3.1.ppc64le",
"product": {
"name": "fractal-12.0-3.1.ppc64le",
"product_id": "fractal-12.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "fractal-lang-12.0-3.1.ppc64le",
"product": {
"name": "fractal-lang-12.0-3.1.ppc64le",
"product_id": "fractal-lang-12.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "fractal-12.0-3.1.s390x",
"product": {
"name": "fractal-12.0-3.1.s390x",
"product_id": "fractal-12.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "fractal-lang-12.0-3.1.s390x",
"product": {
"name": "fractal-lang-12.0-3.1.s390x",
"product_id": "fractal-lang-12.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "fractal-12.0-3.1.x86_64",
"product": {
"name": "fractal-12.0-3.1.x86_64",
"product_id": "fractal-12.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "fractal-lang-12.0-3.1.x86_64",
"product": {
"name": "fractal-lang-12.0-3.1.x86_64",
"product_id": "fractal-lang-12.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.aarch64"
},
"product_reference": "fractal-12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le"
},
"product_reference": "fractal-12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.s390x"
},
"product_reference": "fractal-12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-12.0-3.1.x86_64"
},
"product_reference": "fractal-12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-lang-12.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64"
},
"product_reference": "fractal-lang-12.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-lang-12.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le"
},
"product_reference": "fractal-lang-12.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-lang-12.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x"
},
"product_reference": "fractal-lang-12.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "fractal-lang-12.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64"
},
"product_reference": "fractal-lang-12.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:fractal-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-12.0-3.1.x86_64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:fractal-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-12.0-3.1.x86_64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:fractal-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-12.0-3.1.x86_64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.aarch64",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.ppc64le",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.s390x",
"openSUSE Tumbleweed:fractal-lang-12.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15444-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
framework_tool-0.4.5-2.1 on GA media
Notes
Title of the patch
framework_tool-0.4.5-2.1 on GA media
Description of the patch
These are all security issues fixed in the framework_tool-0.4.5-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15444
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "framework_tool-0.4.5-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the framework_tool-0.4.5-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15444",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15444-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "framework_tool-0.4.5-2.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15444-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "framework_tool-0.4.5-2.1.aarch64",
"product": {
"name": "framework_tool-0.4.5-2.1.aarch64",
"product_id": "framework_tool-0.4.5-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "framework_tool-0.4.5-2.1.ppc64le",
"product": {
"name": "framework_tool-0.4.5-2.1.ppc64le",
"product_id": "framework_tool-0.4.5-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "framework_tool-0.4.5-2.1.s390x",
"product": {
"name": "framework_tool-0.4.5-2.1.s390x",
"product_id": "framework_tool-0.4.5-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "framework_tool-0.4.5-2.1.x86_64",
"product": {
"name": "framework_tool-0.4.5-2.1.x86_64",
"product_id": "framework_tool-0.4.5-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "framework_tool-0.4.5-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64"
},
"product_reference": "framework_tool-0.4.5-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "framework_tool-0.4.5-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le"
},
"product_reference": "framework_tool-0.4.5-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "framework_tool-0.4.5-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x"
},
"product_reference": "framework_tool-0.4.5-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "framework_tool-0.4.5-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64"
},
"product_reference": "framework_tool-0.4.5-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.aarch64",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.ppc64le",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.s390x",
"openSUSE Tumbleweed:framework_tool-0.4.5-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15470-1
Vulnerability from csaf_opensuse
Published
2025-08-20 00:00
Modified
2025-08-20 00:00
Summary
wicked2nm-1.2.1-1.1 on GA media
Notes
Title of the patch
wicked2nm-1.2.1-1.1 on GA media
Description of the patch
These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15470
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "wicked2nm-1.2.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the wicked2nm-1.2.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15470",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15470-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "wicked2nm-1.2.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-20T00:00:00Z",
"generator": {
"date": "2025-08-20T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15470-1",
"initial_release_date": "2025-08-20T00:00:00Z",
"revision_history": [
{
"date": "2025-08-20T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.aarch64",
"product": {
"name": "wicked2nm-1.2.1-1.1.aarch64",
"product_id": "wicked2nm-1.2.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.ppc64le",
"product": {
"name": "wicked2nm-1.2.1-1.1.ppc64le",
"product_id": "wicked2nm-1.2.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.s390x",
"product": {
"name": "wicked2nm-1.2.1-1.1.s390x",
"product_id": "wicked2nm-1.2.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "wicked2nm-1.2.1-1.1.x86_64",
"product": {
"name": "wicked2nm-1.2.1-1.1.x86_64",
"product_id": "wicked2nm-1.2.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64"
},
"product_reference": "wicked2nm-1.2.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le"
},
"product_reference": "wicked2nm-1.2.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x"
},
"product_reference": "wicked2nm-1.2.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.2.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
},
"product_reference": "wicked2nm-1.2.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.aarch64",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.ppc64le",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.s390x",
"openSUSE Tumbleweed:wicked2nm-1.2.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-20T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15480-1
Vulnerability from csaf_opensuse
Published
2025-08-21 00:00
Modified
2025-08-21 00:00
Summary
keylime-ima-policy-0.2.8+12-1.1 on GA media
Notes
Title of the patch
keylime-ima-policy-0.2.8+12-1.1 on GA media
Description of the patch
These are all security issues fixed in the keylime-ima-policy-0.2.8+12-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15480
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "keylime-ima-policy-0.2.8+12-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the keylime-ima-policy-0.2.8+12-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15480",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15480-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "keylime-ima-policy-0.2.8+12-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-21T00:00:00Z",
"generator": {
"date": "2025-08-21T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15480-1",
"initial_release_date": "2025-08-21T00:00:00Z",
"revision_history": [
{
"date": "2025-08-21T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-1.1.aarch64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-1.1.aarch64",
"product_id": "keylime-ima-policy-0.2.8+12-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"product": {
"name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"product_id": "keylime-ima-policy-0.2.8+12-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.ppc64le",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.ppc64le",
"product_id": "rust-keylime-0.2.8+12-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-1.1.s390x",
"product": {
"name": "keylime-ima-policy-0.2.8+12-1.1.s390x",
"product_id": "keylime-ima-policy-0.2.8+12-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.s390x",
"product_id": "rust-keylime-0.2.8+12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-1.1.x86_64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-1.1.x86_64",
"product_id": "keylime-ima-policy-0.2.8+12-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-ima-policy-0.2.8+12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64"
},
"product_reference": "keylime-ima-policy-0.2.8+12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-ima-policy-0.2.8+12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le"
},
"product_reference": "keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-ima-policy-0.2.8+12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x"
},
"product_reference": "keylime-ima-policy-0.2.8+12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keylime-ima-policy-0.2.8+12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64"
},
"product_reference": "keylime-ima-policy-0.2.8+12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:keylime-ima-policy-0.2.8+12-1.1.x86_64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.aarch64",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.ppc64le",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.s390x",
"openSUSE Tumbleweed:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-21T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025:15497-1
Vulnerability from csaf_opensuse
Published
2025-08-27 00:00
Modified
2025-08-27 00:00
Summary
scx-1.0.15-2.1 on GA media
Notes
Title of the patch
scx-1.0.15-2.1 on GA media
Description of the patch
These are all security issues fixed in the scx-1.0.15-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15497
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "scx-1.0.15-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the scx-1.0.15-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15497",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15497-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "scx-1.0.15-2.1 on GA media",
"tracking": {
"current_release_date": "2025-08-27T00:00:00Z",
"generator": {
"date": "2025-08-27T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15497-1",
"initial_release_date": "2025-08-27T00:00:00Z",
"revision_history": [
{
"date": "2025-08-27T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "scx-1.0.15-2.1.aarch64",
"product": {
"name": "scx-1.0.15-2.1.aarch64",
"product_id": "scx-1.0.15-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "scx-devel-1.0.15-2.1.aarch64",
"product": {
"name": "scx-devel-1.0.15-2.1.aarch64",
"product_id": "scx-devel-1.0.15-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "scx-1.0.15-2.1.ppc64le",
"product": {
"name": "scx-1.0.15-2.1.ppc64le",
"product_id": "scx-1.0.15-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "scx-devel-1.0.15-2.1.ppc64le",
"product": {
"name": "scx-devel-1.0.15-2.1.ppc64le",
"product_id": "scx-devel-1.0.15-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "scx-1.0.15-2.1.s390x",
"product": {
"name": "scx-1.0.15-2.1.s390x",
"product_id": "scx-1.0.15-2.1.s390x"
}
},
{
"category": "product_version",
"name": "scx-devel-1.0.15-2.1.s390x",
"product": {
"name": "scx-devel-1.0.15-2.1.s390x",
"product_id": "scx-devel-1.0.15-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "scx-1.0.15-2.1.x86_64",
"product": {
"name": "scx-1.0.15-2.1.x86_64",
"product_id": "scx-1.0.15-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "scx-devel-1.0.15-2.1.x86_64",
"product": {
"name": "scx-devel-1.0.15-2.1.x86_64",
"product_id": "scx-devel-1.0.15-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-1.0.15-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64"
},
"product_reference": "scx-1.0.15-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-1.0.15-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le"
},
"product_reference": "scx-1.0.15-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-1.0.15-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.s390x"
},
"product_reference": "scx-1.0.15-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-1.0.15-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64"
},
"product_reference": "scx-1.0.15-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-devel-1.0.15-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64"
},
"product_reference": "scx-devel-1.0.15-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-devel-1.0.15-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le"
},
"product_reference": "scx-devel-1.0.15-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-devel-1.0.15-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x"
},
"product_reference": "scx-devel-1.0.15-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "scx-devel-1.0.15-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64"
},
"product_reference": "scx-devel-1.0.15-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:scx-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-1.0.15-2.1.x86_64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.aarch64",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.ppc64le",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.s390x",
"openSUSE Tumbleweed:scx-devel-1.0.15-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
opensuse-su-2025-20013-1
Vulnerability from csaf_opensuse
Published
2025-10-15 12:01
Modified
2025-10-15 12:01
Summary
Recommended update of flake-pilot
Notes
Title of the patch
Recommended update of flake-pilot
Description of the patch
This update for flake-pilot fixes the following issues:
Update version to 3.1.22.
- Fixes to use flakes as normal user
Running a flake is a container based instance provisioning
and startup. Some part of this process requires root permissions
for example mounting the container instance store for the
provisioning step. This commit fixes the required calls to
be properly managed by sudo.
- seed from entropy
- Fix assignment of random sequence number
We should use a seed for the sequence as described in
https://rust-random.github.io/book/guide-seeding.html#a-simple-number
In addition the logic when a random sequence number should
be used was wrong and needed a fix regarding resume and
attach type flakes which must not use a random sequence
- Pass --init option for resume type flakes
In resume mode a sleep command is used to keep the container
open. However, without the --init option there is no signal
handling available. This commit fixes it
- Revert "kill prior remove when using %remove flag"
This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.
no hard killing needed with the event loop entrypoint
- Fixed CVE-2025-55159 slab: incorrect bounds check
Update to slab 0.4.11 to fix the mentioned CVE.
This Fixes bsc#1248004
- Apply clippy fixes
- Create sequence number for the same invocation
If a flake which is not a resume or attach flake is called twice
with the same invocation arguments an error message is displayed
to give this invocation a new name via the @NAME runtime option.
This commit makes this more comfortable and automatically assigns
a random sequence number for the call if no @NAME is given.
- kill prior remove when using %remove flag
In case the container instance should be removed via the %remove
flag, send a kill first, followed by a force remove. The reason
for this is because we use a never ending sleep command as entry
point for resume type containers. If they should be removed the
standard signal send on podman rm will not stop the sleep and
after a period of 10 seconds podman sends a kill signal itself.
We can speedup this process as we know the entry point command
and send the kill signal first followed by the remove which
saves us some wait time spent in podman otherwise.
- Fix clippy hints
variables can be used directly in the format! string
- Prune old images after load
Make sure no <none> image references stay in the registry
Patchnames
openSUSE-Leap-16.0-2
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update of flake-pilot",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for flake-pilot fixes the following issues:\n\nUpdate version to 3.1.22.\n\n- Fixes to use flakes as normal user\n\n Running a flake is a container based instance provisioning\n and startup. Some part of this process requires root permissions\n for example mounting the container instance store for the\n provisioning step. This commit fixes the required calls to\n be properly managed by sudo.\n\n- seed from entropy\n\n- Fix assignment of random sequence number\n\n We should use a seed for the sequence as described in\n https://rust-random.github.io/book/guide-seeding.html#a-simple-number\n In addition the logic when a random sequence number should\n be used was wrong and needed a fix regarding resume and\n attach type flakes which must not use a random sequence\n\n- Pass --init option for resume type flakes\n\n In resume mode a sleep command is used to keep the container\n open. However, without the --init option there is no signal\n handling available. This commit fixes it\n\n- Revert \"kill prior remove when using %remove flag\"\n\n This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.\n no hard killing needed with the event loop entrypoint\n\n- Fixed CVE-2025-55159 slab: incorrect bounds check\n\n Update to slab 0.4.11 to fix the mentioned CVE.\n This Fixes bsc#1248004\n\n- Apply clippy fixes\n\n- Create sequence number for the same invocation\n\n If a flake which is not a resume or attach flake is called twice\n with the same invocation arguments an error message is displayed\n to give this invocation a new name via the @NAME runtime option.\n This commit makes this more comfortable and automatically assigns\n a random sequence number for the call if no @NAME is given.\n\n- kill prior remove when using %remove flag\n\n In case the container instance should be removed via the %remove\n flag, send a kill first, followed by a force remove. The reason\n for this is because we use a never ending sleep command as entry\n point for resume type containers. If they should be removed the\n standard signal send on podman rm will not stop the sleep and\n after a period of 10 seconds podman sends a kill signal itself.\n We can speedup this process as we know the entry point command\n and send the kill signal first followed by the remove which\n saves us some wait time spent in podman otherwise.\n\n- Fix clippy hints\n\n variables can be used directly in the format! string\n\n- Prune old images after load\n\n Make sure no \u003cnone\u003e image references stay in the registry\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-2",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025-20013-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1248004",
"url": "https://bugzilla.suse.com/1248004"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Recommended update of flake-pilot",
"tracking": {
"current_release_date": "2025-10-15T12:01:21Z",
"generator": {
"date": "2025-10-15T12:01:21Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025-20013-1",
"initial_release_date": "2025-10-15T12:01:21Z",
"revision_history": [
{
"date": "2025-10-15T12:01:21Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-3.1.22-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-firecracker-3.1.22-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"product": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"product_id": "flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-3.1.22-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-3.1.22-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-firecracker-3.1.22-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-3.1.22-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-firecracker-3.1.22-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-3.1.22-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch"
},
"product_reference": "flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-firecracker-dracut-netstart-3.1.22-160000.1.1.noarch",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-firecracker-guestvm-tools-3.1.22-160000.1.1.x86_64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"openSUSE Leap 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-15T12:01:21Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-ru-2025:4131-1
Vulnerability from csaf_suse
Published
2025-11-18 15:56
Modified
2025-11-18 15:56
Summary
Recommended update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor
Notes
Title of the patch
Recommended update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor
Description of the patch
This update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor fixes the following issues:
Changes for suse-migration-sle16-activation:
- Simplify interface naming by disabling predictable names at boot
- shellcheck heavily complained
- check migration target before testing for architecture version
- Create systemd.link files for virtual VMware/Hyper-V NICs
- Add changes for newest wicked2nm
- Activation packages can no longer be noarch
- Architecture check before allowing migration to be activated
- Add missing pre snapshot setup to run_migration
- Add wicked2nm network migration
- Setup ExclusiveArch for activation packages
- Make activation package require by provides tag
- Fix product related requirement settings
Changes for SLES16-Migration:
- Added .ssh directory for migration user
- Add etc/motd overlay file
Print message how to show migration progress information
- Fix build on more architectures
- Initial changelog
Changes for SLES16-SAP_Migration:
- Support wicked2nm migration
- Migration live image for SLES4SAP 15 to 16
Changes for suse-migration-services:
- Set systemd offline for Zypper in chroot mode
- Fix apparmor install procedure
- Fixed azuremetadata device lookup
- Use of f-strings not allowed in the DMS
- Simplify interface naming by disabling predictable names at boot
- Fixed test_check_lsm_migration unit test
- Fix setup_host_network_test by mocking os.makedirs
- wicked2nm: log network state on nm-online failure
- Fixed LSM pre checks to be more robust
- shellcheck heavily complained
- Do not evaluate wicked2nm output in precheck
- Fix unit test for lsm check
- prechecks/lsm.py: remove _apparmor_analyze_profiles()
- LSM migration check for AppArmor -> SELinux
- Improve pre-check message
- Fix MinSLEVersion value depending on target
- reduce package set on migration image
- Fixed behavior of wicked2m pre check
- implementation of sshd root login pre-check
- Fixed selinux to apparmor migration
- Fixed reading of migration config for target class
- Add recursion guard to MigrationConfig::_merge_config_dicts
- shrink migration image
- container/sle16/config.sh
- sle16/config.sh - use dropin for s390 migration-config
- doc: fix indentation
- check for migration target by matching ISO file name
- config: introduce dropin dir migration-config.d/
- Apply SLE16 live image setup to container setup
- bind mount only required subdirectories under /run into chroot
- Add missing package requirement
- check migration target before testing for architecture version
- setup_host_network: simplify code - use os.makedirs()
- Create systemd.link files for virtual VMware/Hyper-V NIC
- Preserve systemd.link files from /etc/systemd/network/
- Add changes for the newest wicked2nm
- Ensure wicked2nm is a dependency of pre-checks for SLE 16 migration
- Activation packages can no longer be noarch
- Fix update of image .changes files
- Architecture check before allowing migration to be activated
- Improve error logs when wicked2nm fails
- Include image changelog to version bump
- Ensure wicked2nm migration is always running, despite warnings
- Fix: add --no-recommends on patterns-base-selinux installation
- Update suse-migration-services for container use
- Update SLE16 migration container
- Update SAP live migration image
- Add missing pre snapshot setup to run_migration
- Follow up fix for the wicked to nm migration
- Add wicked2nm network migration
- Add glob support to preserve_files
- Setup ExclusiveArch for activation packages
- Build sles4sap migration for cloud on x86_64 only
- Do not build sles4sap migration on s390x
- Use systemctl kexec
- Fix: return the correct kernel path based on machine type
- Fixed glob pattern match for package name
- Remove menitoning of SLES 12-SP4
- Make activation package require by provides tag
- Added SLES16-SAP_Migration live image
- Do not use list[str] type hint
- Fix error evaluation from offline_migrations API
- Fix logging from non unit files
- Fix product related requirement settings
- Repos for migration image must be in kiwi
- Added .ssh to migration user for SAP 15 live image
- Added SLES15-SAP_Migration Makefile target
- Add proper release package for SLE16 migration
- Fix typo in service name
- Drop obsolete check for resolv.conf
- Fix migration user home dir setup for SLE16
- Update README_QA.rst
- test: split unit test for setup_name_resolver
- Install patterns-base-selinux for Apparmor migration
- Ensure the rebuild counter is not stripped from the rpm
- Exit silently if no migration iso is found
- Ensure rpmlintrc file is part of suse-migration-services SRPM
- Ignore fixup! entries when generating changelog
- Increase python test matrix
- Remove redundanct requires on itself
- Fix ordering of pre-checks and actual migration
- Add SLES15-Migration target to Makefile
- Fix suse-migration-console-log service
- Fix typo in REA- Activate only connections if present in the current system
- Improve error output, exit codes and add flag to disable user hints
- Add support for autoip-fallback
- Issue only a info when dhcp.update is non default
- Add ipv4_static broadcast
- Apply dhcp settings to mirror wicked client id
- Fix test.sh, fail if migration succeed but expect fail
- Fix sysctl handling
- Avoid cloning in parsing of route
- Fix continue migration to show all warnings beforehand
- Improve warning messages - show interface, element names
- Remove unwrap in route parsing
- bump slab from 0.4.10 to 0.4.11 to address CVE-2025-55159 (bsc#1248010)
- Fix netconfig handling with proper priority setting
- Add ovs support
- Use agama-network instead of agama-(lib|server)
- Only activate connections marked with autostart
- Give hint in error message how to ignore warnings
- Update README.md with updated installation and usage infos
- Add support for Leap 15
- Remove BuildRequires that are no longer necessary due to the agama-network switch.
- The agama-network switch also removes the vulnerable and
unmaintained 'users' crate from the dependencies. (bsc#1244188)DME_QA
- Fix: split name resolver setup into its own service
- Fix: set path according to current arch in grub.d/99_migration
- Add support to enable single rpm transaction for upgrade
- enable suse-migration-ha.service in the migration image
- Migration for high availability extension
- RPM wrapper fixes
- Cleanup secfile to follow python singlespec policy
- Support product specifier in ISO name
- Ensure sle16 images can build on all supported platforms
- Use name pattern compatible to suse-migration-rpm
- Fix SLE15 migration images
- SAP product should migrate to 15 SP4
- Add SLES15-SAP-Migration
- Bump target to SLE15 SP7
- Update bumpversion config
Include sle16 container build to version bump
- Handle selinux boot option when using kexec
- Ensure migration to SLES16 uses selinux, not apparmor
- improve os-release parsing
- Ensure SLES16 is also detected in SCC precheck
- Add high availablity extension check
- Fix package names for python packages on SLE16
- Relax on the shim-install call
- Fixup package name for SLE16 and SLE16 container
- Fix changelog references for activation packages
- Add product migration check
Changes for suse-migration-rpm:
- Fix MinSLEVersion value depending on target
- Add product requirement according to image name.
- Exit silently if no migration iso is found.
- Add build and perl(Date::Parse) to ensure we can append changelog entries to generated package.
Changes for wicked2nm:
- Activate only connections if present in the current system
- Improve error output, exit codes and add flag to disable user hints
- Add support for autoip-fallback
- Issue only a info when dhcp.update is non default
- Add ipv4_static broadcast
- Apply dhcp settings to mirror wicked client id
- Fix test.sh, fail if migration succeed but expect fail
- Fix sysctl handling
- Avoid cloning in parsing of route
- Fix continue migration to show all warnings beforehand
- Improve warning messages - show interface, element names
- Remove unwrap in route parsing
- bump slab from 0.4.10 to 0.4.11 to address CVE-2025-55159 (bsc#1248010)
- Fix netconfig handling with proper priority setting
- Add ovs support
- Use agama-network instead of agama-(lib|server)
- Only activate connections marked with autostart
- Give hint in error message how to ignore warnings
- Update README.md with updated installation and usage infos
- Add support for Leap 15
- Remove BuildRequires that are no longer necessary due to the agama-network switch.
- The agama-network switch also removes the vulnerable and
unmaintained 'users' crate from the dependencies. (bsc#1244188)
Chages for image-janitor:
- Fix packaging (add doc, license)
- Release 0.2.0 with configuration files packaged
- Initial packag
Patchnames
SUSE-2025-4131,SUSE-SLE-Module-Basesystem-15-SP7-2025-4131,SUSE-SLE-Module-SAP-Applications-15-SP7-2025-4131
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor fixes the following issues:\n\nChanges for suse-migration-sle16-activation:\n\n- Simplify interface naming by disabling predictable names at boot\n- shellcheck heavily complained\n- check migration target before testing for architecture version\n- Create systemd.link files for virtual VMware/Hyper-V NICs\n- Add changes for newest wicked2nm\n- Activation packages can no longer be noarch\n- Architecture check before allowing migration to be activated\n- Add missing pre snapshot setup to run_migration\n- Add wicked2nm network migration\n- Setup ExclusiveArch for activation packages\n- Make activation package require by provides tag\n- Fix product related requirement settings\n\nChanges for SLES16-Migration:\n\n- Added .ssh directory for migration user\n- Add etc/motd overlay file\n Print message how to show migration progress information\n- Fix build on more architectures\n- Initial changelog\n \nChanges for SLES16-SAP_Migration:\n\n- Support wicked2nm migration\n- Migration live image for SLES4SAP 15 to 16\n\nChanges for suse-migration-services:\n\n- Set systemd offline for Zypper in chroot mode\n- Fix apparmor install procedure\n- Fixed azuremetadata device lookup\n- Use of f-strings not allowed in the DMS\n- Simplify interface naming by disabling predictable names at boot\n- Fixed test_check_lsm_migration unit test\n- Fix setup_host_network_test by mocking os.makedirs\n- wicked2nm: log network state on nm-online failure\n- Fixed LSM pre checks to be more robust\n- shellcheck heavily complained\n- Do not evaluate wicked2nm output in precheck\n- Fix unit test for lsm check\n- prechecks/lsm.py: remove _apparmor_analyze_profiles()\n- LSM migration check for AppArmor -\u003e SELinux\n- Improve pre-check message\n- Fix MinSLEVersion value depending on target\n- reduce package set on migration image\n- Fixed behavior of wicked2m pre check\n- implementation of sshd root login pre-check\n- Fixed selinux to apparmor migration\n- Fixed reading of migration config for target class\n- Add recursion guard to MigrationConfig::_merge_config_dicts\n- shrink migration image\n- container/sle16/config.sh\n- sle16/config.sh - use dropin for s390 migration-config\n- doc: fix indentation\n- check for migration target by matching ISO file name\n- config: introduce dropin dir migration-config.d/\n- Apply SLE16 live image setup to container setup\n- bind mount only required subdirectories under /run into chroot\n- Add missing package requirement\n- check migration target before testing for architecture version\n- setup_host_network: simplify code - use os.makedirs()\n- Create systemd.link files for virtual VMware/Hyper-V NIC\n- Preserve systemd.link files from /etc/systemd/network/ \n- Add changes for the newest wicked2nm\n- Ensure wicked2nm is a dependency of pre-checks for SLE 16 migration\n- Activation packages can no longer be noarch\n- Fix update of image .changes files\n- Architecture check before allowing migration to be activated\n- Improve error logs when wicked2nm fails\n- Include image changelog to version bump\n- Ensure wicked2nm migration is always running, despite warnings\n- Fix: add --no-recommends on patterns-base-selinux installation\n- Update suse-migration-services for container use\n- Update SLE16 migration container\n- Update SAP live migration image\n- Add missing pre snapshot setup to run_migration\n- Follow up fix for the wicked to nm migration\n- Add wicked2nm network migration\n- Add glob support to preserve_files\n- Setup ExclusiveArch for activation packages\n- Build sles4sap migration for cloud on x86_64 only\n- Do not build sles4sap migration on s390x \n- Use systemctl kexec\n- Fix: return the correct kernel path based on machine type\n- Fixed glob pattern match for package name\n- Remove menitoning of SLES 12-SP4\n- Make activation package require by provides tag\n- Added SLES16-SAP_Migration live image\n- Do not use list[str] type hint\n- Fix error evaluation from offline_migrations API\n- Fix logging from non unit files\n- Fix product related requirement settings\n- Repos for migration image must be in kiwi\n- Added .ssh to migration user for SAP 15 live image\n- Added SLES15-SAP_Migration Makefile target\n- Add proper release package for SLE16 migration\n- Fix typo in service name\n- Drop obsolete check for resolv.conf\n- Fix migration user home dir setup for SLE16\n- Update README_QA.rst\n- test: split unit test for setup_name_resolver\n- Install patterns-base-selinux for Apparmor migration\n- Ensure the rebuild counter is not stripped from the rpm\n- Exit silently if no migration iso is found\n- Ensure rpmlintrc file is part of suse-migration-services SRPM\n- Ignore fixup! entries when generating changelog\n- Increase python test matrix\n- Remove redundanct requires on itself\n- Fix ordering of pre-checks and actual migration\n- Add SLES15-Migration target to Makefile\n- Fix suse-migration-console-log service\n- Fix typo in REA- Activate only connections if present in the current system\n- Improve error output, exit codes and add flag to disable user hints\n- Add support for autoip-fallback\n- Issue only a info when dhcp.update is non default \n- Add ipv4_static broadcast \n- Apply dhcp settings to mirror wicked client id \n- Fix test.sh, fail if migration succeed but expect fail \n- Fix sysctl handling \n- Avoid cloning in parsing of route \n- Fix continue migration to show all warnings beforehand \n- Improve warning messages - show interface, element names \n- Remove unwrap in route parsing \n- bump slab from 0.4.10 to 0.4.11 to address CVE-2025-55159 (bsc#1248010)\n- Fix netconfig handling with proper priority setting\n- Add ovs support\n- Use agama-network instead of agama-(lib|server)\n- Only activate connections marked with autostart\n- Give hint in error message how to ignore warnings\n- Update README.md with updated installation and usage infos\n- Add support for Leap 15\n- Remove BuildRequires that are no longer necessary due to the agama-network switch.\n- The agama-network switch also removes the vulnerable and\n unmaintained \u0027users\u0027 crate from the dependencies. (bsc#1244188)DME_QA\n- Fix: split name resolver setup into its own service\n- Fix: set path according to current arch in grub.d/99_migration\n- Add support to enable single rpm transaction for upgrade\n- enable suse-migration-ha.service in the migration image\n- Migration for high availability extension\n- RPM wrapper fixes\n- Cleanup secfile to follow python singlespec policy\n- Support product specifier in ISO name\n- Ensure sle16 images can build on all supported platforms\n- Use name pattern compatible to suse-migration-rpm\n- Fix SLE15 migration images\n- SAP product should migrate to 15 SP4\n- Add SLES15-SAP-Migration\n- Bump target to SLE15 SP7\n- Update bumpversion config\n Include sle16 container build to version bump\n- Handle selinux boot option when using kexec\n- Ensure migration to SLES16 uses selinux, not apparmor\n- improve os-release parsing\n- Ensure SLES16 is also detected in SCC precheck\n- Add high availablity extension check\n- Fix package names for python packages on SLE16\n- Relax on the shim-install call\n- Fixup package name for SLE16 and SLE16 container\n- Fix changelog references for activation packages\n- Add product migration check\n \nChanges for suse-migration-rpm:\n\n- Fix MinSLEVersion value depending on target\n- Add product requirement according to image name.\n- Exit silently if no migration iso is found. \n- Add build and perl(Date::Parse) to ensure we can append changelog entries to generated package.\n\nChanges for wicked2nm:\n \n- Activate only connections if present in the current system\n- Improve error output, exit codes and add flag to disable user hints\n- Add support for autoip-fallback\n- Issue only a info when dhcp.update is non default \n- Add ipv4_static broadcast \n- Apply dhcp settings to mirror wicked client id \n- Fix test.sh, fail if migration succeed but expect fail \n- Fix sysctl handling \n- Avoid cloning in parsing of route \n- Fix continue migration to show all warnings beforehand \n- Improve warning messages - show interface, element names \n- Remove unwrap in route parsing \n- bump slab from 0.4.10 to 0.4.11 to address CVE-2025-55159 (bsc#1248010)\n- Fix netconfig handling with proper priority setting\n- Add ovs support\n- Use agama-network instead of agama-(lib|server)\n- Only activate connections marked with autostart\n- Give hint in error message how to ignore warnings\n- Update README.md with updated installation and usage infos\n- Add support for Leap 15\n- Remove BuildRequires that are no longer necessary due to the agama-network switch.\n- The agama-network switch also removes the vulnerable and\n unmaintained \u0027users\u0027 crate from the dependencies. (bsc#1244188)\n \nChages for image-janitor:\n- Fix packaging (add doc, license)\n- Release 0.2.0 with configuration files packaged\n- Initial packag\n ",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4131,SUSE-SLE-Module-Basesystem-15-SP7-2025-4131,SUSE-SLE-Module-SAP-Applications-15-SP7-2025-4131",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2025_4131-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-RU-2025:4131-1",
"url": "https://www.suse.com/support/update/announcement//suse-ru-20254131-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-RU-2025:4131-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-November/042745.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133919",
"url": "https://bugzilla.suse.com/1133919"
},
{
"category": "self",
"summary": "SUSE Bug 1142108",
"url": "https://bugzilla.suse.com/1142108"
},
{
"category": "self",
"summary": "SUSE Bug 1155192",
"url": "https://bugzilla.suse.com/1155192"
},
{
"category": "self",
"summary": "SUSE Bug 1173532",
"url": "https://bugzilla.suse.com/1173532"
},
{
"category": "self",
"summary": "SUSE Bug 1178737",
"url": "https://bugzilla.suse.com/1178737"
},
{
"category": "self",
"summary": "SUSE Bug 1182520",
"url": "https://bugzilla.suse.com/1182520"
},
{
"category": "self",
"summary": "SUSE Bug 1199028",
"url": "https://bugzilla.suse.com/1199028"
},
{
"category": "self",
"summary": "SUSE Bug 1209304",
"url": "https://bugzilla.suse.com/1209304"
},
{
"category": "self",
"summary": "SUSE Bug 1209591",
"url": "https://bugzilla.suse.com/1209591"
},
{
"category": "self",
"summary": "SUSE Bug 1211240",
"url": "https://bugzilla.suse.com/1211240"
},
{
"category": "self",
"summary": "SUSE Bug 1219004",
"url": "https://bugzilla.suse.com/1219004"
},
{
"category": "self",
"summary": "SUSE Bug 1222258",
"url": "https://bugzilla.suse.com/1222258"
},
{
"category": "self",
"summary": "SUSE Bug 1244188",
"url": "https://bugzilla.suse.com/1244188"
},
{
"category": "self",
"summary": "SUSE Bug 1246513",
"url": "https://bugzilla.suse.com/1246513"
},
{
"category": "self",
"summary": "SUSE Bug 1248010",
"url": "https://bugzilla.suse.com/1248010"
},
{
"category": "self",
"summary": "SUSE Bug 1248137",
"url": "https://bugzilla.suse.com/1248137"
},
{
"category": "self",
"summary": "SUSE Bug 1250076",
"url": "https://bugzilla.suse.com/1250076"
},
{
"category": "self",
"summary": "SUSE Bug 1250078",
"url": "https://bugzilla.suse.com/1250078"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Recommended update for suse-migration-sle16-activation, SLES16-Migration, SLES16-SAP_Migration, suse-migration-services, suse-migration-rpm, wicked2nm, image-janitor",
"tracking": {
"current_release_date": "2025-11-18T15:56:53Z",
"generator": {
"date": "2025-11-18T15:56:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-RU-2025:4131-1",
"initial_release_date": "2025-11-18T15:56:53Z",
"revision_history": [
{
"date": "2025-11-18T15:56:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "SLES16-Migration-2.1.26-15.22.4.aarch64",
"product": {
"name": "SLES16-Migration-2.1.26-15.22.4.aarch64",
"product_id": "SLES16-Migration-2.1.26-15.22.4.aarch64"
}
},
{
"category": "product_version",
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.aarch64",
"product": {
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.aarch64",
"product_id": "suse-migration-rpm-1.0.1-150700.16.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"product": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"product_id": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "wicked2nm-1.4.0-150700.15.7.2.aarch64",
"product": {
"name": "wicked2nm-1.4.0-150700.15.7.2.aarch64",
"product_id": "wicked2nm-1.4.0-150700.15.7.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.i586",
"product": {
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.i586",
"product_id": "suse-migration-rpm-1.0.1-150700.16.5.1.i586"
}
},
{
"category": "product_version",
"name": "wicked2nm-1.4.0-150700.15.7.2.i586",
"product": {
"name": "wicked2nm-1.4.0-150700.15.7.2.i586",
"product_id": "wicked2nm-1.4.0-150700.15.7.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"product": {
"name": "python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"product_id": "python3-Cerberus-1.3.2-150700.20.2.10.noarch"
}
},
{
"category": "product_version",
"name": "python3-migration-2.1.26-150700.16.12.1.noarch",
"product": {
"name": "python3-migration-2.1.26-150700.16.12.1.noarch",
"product_id": "python3-migration-2.1.26-150700.16.12.1.noarch"
}
},
{
"category": "product_version",
"name": "suse-migration-2.1.26-150700.16.12.1.noarch",
"product": {
"name": "suse-migration-2.1.26-150700.16.12.1.noarch",
"product_id": "suse-migration-2.1.26-150700.16.12.1.noarch"
}
},
{
"category": "product_version",
"name": "suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"product": {
"name": "suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"product_id": "suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch"
}
},
{
"category": "product_version",
"name": "suse-migration-services-2.1.26-150700.16.12.1.noarch",
"product": {
"name": "suse-migration-services-2.1.26-150700.16.12.1.noarch",
"product_id": "suse-migration-services-2.1.26-150700.16.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "SLES16-Migration-2.1.26-15.22.4.ppc64le",
"product": {
"name": "SLES16-Migration-2.1.26-15.22.4.ppc64le",
"product_id": "SLES16-Migration-2.1.26-15.22.4.ppc64le"
}
},
{
"category": "product_version",
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"product": {
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"product_id": "SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.ppc64le",
"product": {
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.ppc64le",
"product_id": "suse-migration-rpm-1.0.1-150700.16.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"product": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"product_id": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"product": {
"name": "wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"product_id": "wicked2nm-1.4.0-150700.15.7.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "SLES16-Migration-2.1.26-15.22.4.s390x",
"product": {
"name": "SLES16-Migration-2.1.26-15.22.4.s390x",
"product_id": "SLES16-Migration-2.1.26-15.22.4.s390x"
}
},
{
"category": "product_version",
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.s390x",
"product": {
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.s390x",
"product_id": "suse-migration-rpm-1.0.1-150700.16.5.1.s390x"
}
},
{
"category": "product_version",
"name": "wicked2nm-1.4.0-150700.15.7.2.s390x",
"product": {
"name": "wicked2nm-1.4.0-150700.15.7.2.s390x",
"product_id": "wicked2nm-1.4.0-150700.15.7.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "SLES16-Migration-2.1.26-15.22.4.x86_64",
"product": {
"name": "SLES16-Migration-2.1.26-15.22.4.x86_64",
"product_id": "SLES16-Migration-2.1.26-15.22.4.x86_64"
}
},
{
"category": "product_version",
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.x86_64",
"product": {
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.x86_64",
"product_id": "SLES16-SAP_Migration-2.1.26-15.14.4.x86_64"
}
},
{
"category": "product_version",
"name": "image-janitor-0.2.0-150700.15.3.1.x86_64",
"product": {
"name": "image-janitor-0.2.0-150700.15.3.1.x86_64",
"product_id": "image-janitor-0.2.0-150700.15.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.x86_64",
"product": {
"name": "suse-migration-rpm-1.0.1-150700.16.5.1.x86_64",
"product_id": "suse-migration-rpm-1.0.1-150700.16.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"product": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"product_id": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "wicked2nm-1.4.0-150700.15.7.2.x86_64",
"product": {
"name": "wicked2nm-1.4.0-150700.15.7.2.x86_64",
"product_id": "wicked2nm-1.4.0-150700.15.7.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for SAP Applications 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for SAP Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for SAP Applications 15 SP7"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-Migration-2.1.26-15.22.4.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.aarch64"
},
"product_reference": "SLES16-Migration-2.1.26-15.22.4.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-Migration-2.1.26-15.22.4.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.ppc64le"
},
"product_reference": "SLES16-Migration-2.1.26-15.22.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-Migration-2.1.26-15.22.4.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.s390x"
},
"product_reference": "SLES16-Migration-2.1.26-15.22.4.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-Migration-2.1.26-15.22.4.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.x86_64"
},
"product_reference": "SLES16-Migration-2.1.26-15.22.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-Cerberus-1.3.2-150700.20.2.10.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-Cerberus-1.3.2-150700.20.2.10.noarch"
},
"product_reference": "python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-migration-2.1.26-150700.16.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-migration-2.1.26-150700.16.12.1.noarch"
},
"product_reference": "python3-migration-2.1.26-150700.16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch"
},
"product_reference": "suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64"
},
"product_reference": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le"
},
"product_reference": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64"
},
"product_reference": "suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.4.0-150700.15.7.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.aarch64"
},
"product_reference": "wicked2nm-1.4.0-150700.15.7.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.4.0-150700.15.7.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.ppc64le"
},
"product_reference": "wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.4.0-150700.15.7.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.s390x"
},
"product_reference": "wicked2nm-1.4.0-150700.15.7.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "wicked2nm-1.4.0-150700.15.7.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.x86_64"
},
"product_reference": "wicked2nm-1.4.0-150700.15.7.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le as component of SUSE Linux Enterprise Module for SAP Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le"
},
"product_reference": "SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for SAP Applications 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "SLES16-SAP_Migration-2.1.26-15.14.4.x86_64 as component of SUSE Linux Enterprise Module for SAP Applications 15 SP7",
"product_id": "SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.x86_64"
},
"product_reference": "SLES16-SAP_Migration-2.1.26-15.14.4.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for SAP Applications 15 SP7"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-migration-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.x86_64",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-migration-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.x86_64",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:SLES16-Migration-2.1.26-15.22.4.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-Cerberus-1.3.2-150700.20.2.10.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:python3-migration-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-pre-checks-2.1.26-150700.16.12.1.noarch",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:suse-migration-sle16-activation-2.1.26-150700.15.9.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:wicked2nm-1.4.0-150700.15.7.2.x86_64",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.ppc64le",
"SUSE Linux Enterprise Module for SAP Applications 15 SP7:SLES16-SAP_Migration-2.1.26-15.14.4.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-18T15:56:53Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:02962-1
Vulnerability from csaf_suse
Published
2025-08-22 12:50
Modified
2025-08-22 12:50
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update slab to version 0.4.11:
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
Patchnames
SUSE-2025-2962,SUSE-SLE-Micro-5.5-2025-2962
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust-keylime",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust-keylime fixes the following issues:\n\n- Update slab to version 0.4.11:\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2962,SUSE-SLE-Micro-5.5-2025-2962",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02962-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02962-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502962-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02962-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041342.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248006",
"url": "https://bugzilla.suse.com/1248006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for rust-keylime",
"tracking": {
"current_release_date": "2025-08-22T12:50:26Z",
"generator": {
"date": "2025-08-22T12:50:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02962-1",
"initial_release_date": "2025-08-22T12:50:26Z",
"revision_history": [
{
"date": "2025-08-22T12:50:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64",
"product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le",
"product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"product": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"product_id": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x",
"product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.s390x"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"product_id": "rust-keylime-0.2.8+12-150500.3.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64",
"product_id": "keylime-ima-policy-0.2.8+12-150500.3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le"
},
"product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-150500.3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.5:rust-keylime-0.2.8+12-150500.3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-22T12:50:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:3944-1
Vulnerability from csaf_suse
Published
2025-11-05 08:16
Modified
2025-11-05 08:16
Summary
Security update for sccache
Notes
Title of the patch
Security update for sccache
Description of the patch
This update for sccache fixes the following issues:
- CVE-2025-55159 - updated slab with the uninit memory access fix (bsc#1248003)
Patchnames
SUSE-2025-3944,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3944,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3944,openSUSE-SLE-15.6-2025-3944
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for sccache",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for sccache fixes the following issues:\n\n - CVE-2025-55159 - updated slab with the uninit memory access fix (bsc#1248003)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3944,SUSE-SLE-Module-Development-Tools-15-SP6-2025-3944,SUSE-SLE-Module-Development-Tools-15-SP7-2025-3944,openSUSE-SLE-15.6-2025-3944",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3944-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3944-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253944-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3944-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023158.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248003",
"url": "https://bugzilla.suse.com/1248003"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for sccache",
"tracking": {
"current_release_date": "2025-11-05T08:16:30Z",
"generator": {
"date": "2025-11-05T08:16:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3944-1",
"initial_release_date": "2025-11-05T08:16:30Z",
"revision_history": [
{
"date": "2025-11-05T08:16:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.2~4-150600.10.6.1.aarch64",
"product": {
"name": "sccache-0.4.2~4-150600.10.6.1.aarch64",
"product_id": "sccache-0.4.2~4-150600.10.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.2~4-150600.10.6.1.i586",
"product": {
"name": "sccache-0.4.2~4-150600.10.6.1.i586",
"product_id": "sccache-0.4.2~4-150600.10.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.2~4-150600.10.6.1.ppc64le",
"product": {
"name": "sccache-0.4.2~4-150600.10.6.1.ppc64le",
"product_id": "sccache-0.4.2~4-150600.10.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.2~4-150600.10.6.1.s390x",
"product": {
"name": "sccache-0.4.2~4-150600.10.6.1.s390x",
"product_id": "sccache-0.4.2~4-150600.10.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "sccache-0.4.2~4-150600.10.6.1.x86_64",
"product": {
"name": "sccache-0.4.2~4-150600.10.6.1.x86_64",
"product_id": "sccache-0.4.2~4-150600.10.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.aarch64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.ppc64le"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.s390x"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.x86_64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.aarch64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.ppc64le"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.s390x"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.x86_64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.aarch64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.ppc64le"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.s390x"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "sccache-0.4.2~4-150600.10.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.x86_64"
},
"product_reference": "sccache-0.4.2~4-150600.10.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.x86_64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.s390x",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.x86_64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.s390x",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP6:sccache-0.4.2~4-150600.10.6.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP7:sccache-0.4.2~4-150600.10.6.1.x86_64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.aarch64",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.ppc64le",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.s390x",
"openSUSE Leap 15.6:sccache-0.4.2~4-150600.10.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-05T08:16:30Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:02957-1
Vulnerability from csaf_suse
Published
2025-08-22 07:56
Modified
2025-08-22 07:56
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update slab to version 0.4.11:
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
Patchnames
SUSE-2025-2957,SUSE-SLE-Micro-5.3-2025-2957
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust-keylime",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust-keylime fixes the following issues:\n\n- Update slab to version 0.4.11:\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2957,SUSE-SLE-Micro-5.3-2025-2957",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02957-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02957-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502957-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02957-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041333.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248006",
"url": "https://bugzilla.suse.com/1248006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for rust-keylime",
"tracking": {
"current_release_date": "2025-08-22T07:56:12Z",
"generator": {
"date": "2025-08-22T07:56:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02957-1",
"initial_release_date": "2025-08-22T07:56:12Z",
"revision_history": [
{
"date": "2025-08-22T07:56:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le",
"product_id": "rust-keylime-0.2.8+12-150400.3.10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.s390x"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"product_id": "rust-keylime-0.2.8+12-150400.3.10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.10.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.10.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.s390x",
"SUSE Linux Enterprise Micro 5.3:rust-keylime-0.2.8+12-150400.3.10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-22T07:56:12Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:3954-1
Vulnerability from csaf_suse
Published
2025-11-05 14:06
Modified
2025-11-05 14:06
Summary
Security update for aws-efs-utils
Notes
Title of the patch
Security update for aws-efs-utils
Description of the patch
This update for aws-efs-utils fixes the following issues:
Update to version 2.3.3 (bsc#1240044).
Security issues fixed:
- CVE-2025-55159: slab: incorrect bounds check in `get_disjoint_mut` function can lead to potential crash due to out-of-bounds access (bsc#1248055).
- CVE-2020-35881: traitobject: log4rs: out-of-bounds write due to fat pointer layout assumptions (bsc#1249851).
Other issues fixed:
- Build and install efs-proxy binary (bsc#1240044).
- Fixed in version 2.3.3:
* Add environment variable support for AWS profiles and regions
* Regenerate Cargo.lock with rust 1.70.0
* Update circle-ci config
* Fix AWS Env Variable Test and Code Style Issue
* Remove CentOS 8 and Ubuntu 16.04 from verified Linux distribution list
- Fixed in version 2.3.2:
* Update version in amazon-efs-utils.spec to 2.3.1
* Fix incorrect package version
- Fixed in version 2.3.1:
* Fix backtrace version to resolve ubuntu and rhel build issues
* Pin Cargo.lock to avoid unexpected error across images
- Fixed in version 2.3.0:
* Add support for pod-identity credentials in the credentials chain
* Enable mounting with IPv6 when using with the 'stunnel' mount option
- Fixed in version 2.2.1:
* Update log4rs
- Fixed in version 2.2.0
* Use region-specific domain suffixes for dns endpoints where missing
* Merge PR #211 - Amend Debian control to use binary architecture
- Fixed in version 2.1.0
* Add mount option for specifying region
* Add new ISO regions to config file
- Fixed in version 2.0.4
* Add retry logic to and increase timeout for EC2 metadata token
retrieval requests
- Fixed in version 2.0.3:
* Upgrade py version
* Replace deprecated usage of datetime
- Fixed in version 2.0.2
* Check for efs-proxy PIDs when cleaning tunnel state files
* Add PID to log entries
- Fxied in version 2.0.1
* Disable Nagle's algorithm for efs-proxy TLS mounts to improve latencies
- Fixed in version 2.0.0:
* Replace stunnel, which provides TLS encryptions for mounts, with efs-proxy, a component built in-house at AWS.
Efs-proxy lays the foundation for upcoming feature launches at EFS.
- Fixed in version 1.36.0:
* Support new mount option: crossaccount, conduct cross account mounts via ip address. Use client AZ-ID to choose
mount target.
- Fixed in version 1.35.2:
* Revert 'Add warning if using older Version'
* Support MacOS Sonoma
- Fixed in version 1.35.1:
* Revert openssl requirement change
* Revert 'Update EFS Documentation: Clarify Current FIPS Compliance Status'
* Update EFS Documentation: Clarify Current FIPS Compliance Status
* test: Change repo urls in eol debian9 build
* Check private key file size to skip generation
* test: Fix pytest that failed since commit 3dd89ca
* Fix should_check_efs_utils_version scope
* Add warning if using old version
* Add 'fsap' option as EFS-only option
- Fixed in version 1.35.0:
* Add parameters to allow mount fo pod impersonation feature in EFS CSI Driver
* Updated the README with support of Oracle8 distribution
* Readme troubleshooting section + table of contents
* Add efs-utils Support for MacOS Ventura EC2 instances
Patchnames
SUSE-2025-3954,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3954,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3954,openSUSE-SLE-15.6-2025-3954
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for aws-efs-utils",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for aws-efs-utils fixes the following issues:\n\nUpdate to version 2.3.3 (bsc#1240044).\n\nSecurity issues fixed:\n\n- CVE-2025-55159: slab: incorrect bounds check in `get_disjoint_mut` function can lead to potential crash due to out-of-bounds access (bsc#1248055).\n- CVE-2020-35881: traitobject: log4rs: out-of-bounds write due to fat pointer layout assumptions (bsc#1249851).\n\nOther issues fixed:\n\n- Build and install efs-proxy binary (bsc#1240044).\n\n- Fixed in version 2.3.3:\n * Add environment variable support for AWS profiles and regions\n * Regenerate Cargo.lock with rust 1.70.0\n * Update circle-ci config\n * Fix AWS Env Variable Test and Code Style Issue\n * Remove CentOS 8 and Ubuntu 16.04 from verified Linux distribution list\n\n- Fixed in version 2.3.2:\n * Update version in amazon-efs-utils.spec to 2.3.1\n * Fix incorrect package version\n\n- Fixed in version 2.3.1:\n * Fix backtrace version to resolve ubuntu and rhel build issues\n * Pin Cargo.lock to avoid unexpected error across images\n\n- Fixed in version 2.3.0:\n * Add support for pod-identity credentials in the credentials chain\n * Enable mounting with IPv6 when using with the \u0027stunnel\u0027 mount option\n\n- Fixed in version 2.2.1:\n * Update log4rs\n\n- Fixed in version 2.2.0\n * Use region-specific domain suffixes for dns endpoints where missing\n * Merge PR #211 - Amend Debian control to use binary architecture\n \n- Fixed in version 2.1.0\n * Add mount option for specifying region\n * Add new ISO regions to config file\n \n- Fixed in version 2.0.4\n * Add retry logic to and increase timeout for EC2 metadata token\n retrieval requests\n\n- Fixed in version 2.0.3:\n * Upgrade py version\n * Replace deprecated usage of datetime\n \n- Fixed in version 2.0.2\n * Check for efs-proxy PIDs when cleaning tunnel state files\n * Add PID to log entries\n \n- Fxied in version 2.0.1\n * Disable Nagle\u0027s algorithm for efs-proxy TLS mounts to improve latencies\n \n- Fixed in version 2.0.0:\n * Replace stunnel, which provides TLS encryptions for mounts, with efs-proxy, a component built in-house at AWS.\n Efs-proxy lays the foundation for upcoming feature launches at EFS.\n\n- Fixed in version 1.36.0:\n * Support new mount option: crossaccount, conduct cross account mounts via ip address. Use client AZ-ID to choose\n mount target.\n \n- Fixed in version 1.35.2:\n * Revert \u0027Add warning if using older Version\u0027\n * Support MacOS Sonoma\n\n- Fixed in version 1.35.1:\n * Revert openssl requirement change\n * Revert \u0027Update EFS Documentation: Clarify Current FIPS Compliance Status\u0027\n * Update EFS Documentation: Clarify Current FIPS Compliance Status\n * test: Change repo urls in eol debian9 build\n * Check private key file size to skip generation\n * test: Fix pytest that failed since commit 3dd89ca\n * Fix should_check_efs_utils_version scope\n * Add warning if using old version\n * Add \u0027fsap\u0027 option as EFS-only option\n\n- Fixed in version 1.35.0:\n * Add parameters to allow mount fo pod impersonation feature in EFS CSI Driver\n * Updated the README with support of Oracle8 distribution\n * Readme troubleshooting section + table of contents\n * Add efs-utils Support for MacOS Ventura EC2 instances\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-3954,SUSE-SLE-Module-Public-Cloud-15-SP6-2025-3954,SUSE-SLE-Module-Public-Cloud-15-SP7-2025-3954,openSUSE-SLE-15.6-2025-3954",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_3954-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:3954-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20253954-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:3954-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023164.html"
},
{
"category": "self",
"summary": "SUSE Bug 1240044",
"url": "https://bugzilla.suse.com/1240044"
},
{
"category": "self",
"summary": "SUSE Bug 1248055",
"url": "https://bugzilla.suse.com/1248055"
},
{
"category": "self",
"summary": "SUSE Bug 1249851",
"url": "https://bugzilla.suse.com/1249851"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-35881 page",
"url": "https://www.suse.com/security/cve/CVE-2020-35881/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for aws-efs-utils",
"tracking": {
"current_release_date": "2025-11-05T14:06:34Z",
"generator": {
"date": "2025-11-05T14:06:34Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:3954-1",
"initial_release_date": "2025-11-05T14:06:34Z",
"revision_history": [
{
"date": "2025-11-05T14:06:34Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"product": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"product_id": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-150600.17.6.1.i586",
"product": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.i586",
"product_id": "aws-efs-utils-2.3.3-150600.17.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"product": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"product_id": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"product": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"product_id": "aws-efs-utils-2.3.3-150600.17.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"product": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"product_id": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
},
"product_reference": "aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-35881",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-35881"
}
],
"notes": [
{
"category": "general",
"text": "An issue was discovered in the traitobject crate through 2020-06-01 for Rust. It has false expectations about fat pointers, possibly causing memory corruption in, for example, Rust 2.x.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-35881",
"url": "https://www.suse.com/security/cve/CVE-2020-35881"
},
{
"category": "external",
"summary": "SUSE Bug 1249848 for CVE-2020-35881",
"url": "https://bugzilla.suse.com/1249848"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-05T14:06:34Z",
"details": "moderate"
}
],
"title": "CVE-2020-35881"
},
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP7:aws-efs-utils-2.3.3-150600.17.6.1.x86_64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.aarch64",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.ppc64le",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.s390x",
"openSUSE Leap 15.6:aws-efs-utils-2.3.3-150600.17.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-05T14:06:34Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:20717-1
Vulnerability from csaf_suse
Published
2025-09-16 07:50
Modified
2025-09-16 07:50
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update vendored crate slab to version 0.4.11
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function
leading to undefined behavior or potential crash due to out-of-bounds
access (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
- Update vendored crate shlex to version 1.3.0
* CVE-2024-58266: Fixed command injection (bsc#1247193)
- Update to version 0.2.7+141:
* service: Use WantedBy=multi-user.target
* rpm: Add subpackage for push-attestation agent
* push-model: implement continuous attestation with configurable intervals
* Retry registration forever in the state machine
* Add Verifier URL to configuration
* Align exp.backoff to current configuration format
* Increase coverage of state machine (using Context)
* Increase coverage of struct_filler.rs
* Groom code (remove dead code)
* Fix exponential backoff (10secs, 4xx accepted)
* test: Add documentation test to tests/run.sh
* tpm: Avoid running code example during documentation tests
* state_machine: Always start the agent from the Unregistered state
* Add fixes for the URL construction
* Refactor evidences collection in push attestation agent
* push-model: refactor attestation logic into a state machine
* Fix body sending by allowing serializing strings (#1057)
* Log ResilientClient errors/response status codes (#1055)
* Add AK signing scheme and hash algorithm to negotiation
* tpm: Add method to extract signing scheme and hash algorithm from AK
* Allow custom content-type/accept headers
* Integrate exponential backoff to registration (#1052)
* keylime/structures: Rename ShaValues to PcrBanks
* Add resilient_client for exponential backoff (#1048)
- Update vendored crate openssl 0.10.73:
* CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch (bsc#1242623)
- Update to version 0.2.7+117:
* Increase coverage in evidence handling structure
* Add Capabilities Negotiations resp. missing fields
* Fix UEFI test to check file access in all cases
* context_info_handler: Do not assume /var/lib/keylime exists
* Fix clippy warnings about uninlined format arguments
* attestation: Allow unwrap() in tests
* Increase coverage (groom code, extend unit tests)
* Include IMA/UEFI logs in Evidence Handling request
* Include method to get all IMA entries as string
* Send correct list of pcr banks and sign algorithms
* Try to fix TPM tests related issues
* Define attestation perform asynchronous
* Perform attestation in push model agent binary
* Refactor code to use new attestation.rs
* Create attestation.rs for Attestation stuff
* Move ContextInfo management to its own handler
* Adjust context_info.rs after rebase
* Add attestation function to ContextInfo structure
* Add prohibited signing algorithms, avoid ecschnorr
* keylime/config: Use macro to implement PushModelConfigTrait
* Introduce keylime-macros and define_view_trait
* config: Remove KeylimeConfig structure
* config: Remove unnecessary options and lazy initialization
* Fix pcr_bank function to send all possible slots
* Send Content-Type:application/json on request (#1039)
* Send correct 'key_algorithm' in certification_keys (#1035)
* Push Model: Persist Attestation Key to file
* Add Keylime push model binary to root GNUmakefile
* Use singleton to avoid multiple Context allocation
* tests: Do not assume `/var/lib/keylime` exists (#1030)
* lib/cert: Fix race condition due to use of same file path
* payloads: Fix race condition in tests
* Add uefi_log_handler.rs to parse UEFI binary
* Use IMA log parser to send correct entry count
* Add IMA log parser
* build(deps): bump once_cell from 1.19.0 to 1.21.3
* lib/config/base.rs: Add more unit tests
* lib/permissions: Add unit tests
* keylime-agent: move JsonWrapper from common.rs to the library
* lib/agent_data: Move agent_data related tests from common
* common: Replace APIVersion with the library Version structure
* keylime_agent: Move secure_mount.rs to the library
* lib: Rename keylime_error.rs as error.rs
* config: Move config to keylime library
* config: Rename push_model_config to push_model
* lib: Move permissions.rs from keylime-agent to the lib
* Extract Capabilities Negotiation info from TPM (#1014)
Patchnames
SUSE-SLE-Micro-6.0-461
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust-keylime",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust-keylime fixes the following issues:\n\n- Update vendored crate slab to version 0.4.11\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function \n leading to undefined behavior or potential crash due to out-of-bounds \n access (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n\n- Update vendored crate shlex to version 1.3.0\n * CVE-2024-58266: Fixed command injection (bsc#1247193) \n\n- Update to version 0.2.7+141:\n * service: Use WantedBy=multi-user.target\n * rpm: Add subpackage for push-attestation agent\n * push-model: implement continuous attestation with configurable intervals\n * Retry registration forever in the state machine\n * Add Verifier URL to configuration\n * Align exp.backoff to current configuration format\n * Increase coverage of state machine (using Context)\n * Increase coverage of struct_filler.rs\n * Groom code (remove dead code)\n * Fix exponential backoff (10secs, 4xx accepted)\n * test: Add documentation test to tests/run.sh\n * tpm: Avoid running code example during documentation tests\n * state_machine: Always start the agent from the Unregistered state\n * Add fixes for the URL construction\n * Refactor evidences collection in push attestation agent\n * push-model: refactor attestation logic into a state machine\n * Fix body sending by allowing serializing strings (#1057)\n * Log ResilientClient errors/response status codes (#1055)\n * Add AK signing scheme and hash algorithm to negotiation\n * tpm: Add method to extract signing scheme and hash algorithm from AK\n * Allow custom content-type/accept headers\n * Integrate exponential backoff to registration (#1052)\n * keylime/structures: Rename ShaValues to PcrBanks\n * Add resilient_client for exponential backoff (#1048)\n\n- Update vendored crate openssl 0.10.73:\n * CVE-2025-3416: Fixed Use-After-Free in Md::fetch and Cipher::fetch (bsc#1242623) \n\n- Update to version 0.2.7+117:\n * Increase coverage in evidence handling structure\n * Add Capabilities Negotiations resp. missing fields\n * Fix UEFI test to check file access in all cases\n * context_info_handler: Do not assume /var/lib/keylime exists\n * Fix clippy warnings about uninlined format arguments\n * attestation: Allow unwrap() in tests\n * Increase coverage (groom code, extend unit tests)\n * Include IMA/UEFI logs in Evidence Handling request\n * Include method to get all IMA entries as string\n * Send correct list of pcr banks and sign algorithms\n * Try to fix TPM tests related issues\n * Define attestation perform asynchronous\n * Perform attestation in push model agent binary\n * Refactor code to use new attestation.rs\n * Create attestation.rs for Attestation stuff\n * Move ContextInfo management to its own handler\n * Adjust context_info.rs after rebase\n * Add attestation function to ContextInfo structure\n * Add prohibited signing algorithms, avoid ecschnorr\n * keylime/config: Use macro to implement PushModelConfigTrait\n * Introduce keylime-macros and define_view_trait\n * config: Remove KeylimeConfig structure\n * config: Remove unnecessary options and lazy initialization\n * Fix pcr_bank function to send all possible slots\n * Send Content-Type:application/json on request (#1039)\n * Send correct \u0027key_algorithm\u0027 in certification_keys (#1035)\n * Push Model: Persist Attestation Key to file\n * Add Keylime push model binary to root GNUmakefile\n * Use singleton to avoid multiple Context allocation\n * tests: Do not assume `/var/lib/keylime` exists (#1030)\n * lib/cert: Fix race condition due to use of same file path\n * payloads: Fix race condition in tests\n * Add uefi_log_handler.rs to parse UEFI binary\n * Use IMA log parser to send correct entry count\n * Add IMA log parser\n * build(deps): bump once_cell from 1.19.0 to 1.21.3\n * lib/config/base.rs: Add more unit tests\n * lib/permissions: Add unit tests\n * keylime-agent: move JsonWrapper from common.rs to the library\n * lib/agent_data: Move agent_data related tests from common\n * common: Replace APIVersion with the library Version structure\n * keylime_agent: Move secure_mount.rs to the library\n * lib: Rename keylime_error.rs as error.rs\n * config: Move config to keylime library\n * config: Rename push_model_config to push_model\n * lib: Move permissions.rs from keylime-agent to the lib\n * Extract Capabilities Negotiation info from TPM (#1014)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-461",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20717-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20717-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520717-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20717-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041931.html"
},
{
"category": "self",
"summary": "SUSE Bug 1242623",
"url": "https://bugzilla.suse.com/1242623"
},
{
"category": "self",
"summary": "SUSE Bug 1247193",
"url": "https://bugzilla.suse.com/1247193"
},
{
"category": "self",
"summary": "SUSE Bug 1248006",
"url": "https://bugzilla.suse.com/1248006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-58266 page",
"url": "https://www.suse.com/security/cve/CVE-2024-58266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for rust-keylime",
"tracking": {
"current_release_date": "2025-09-16T07:50:08Z",
"generator": {
"date": "2025-09-16T07:50:08Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20717-1",
"initial_release_date": "2025-09-16T07:50:08Z",
"revision_history": [
{
"date": "2025-09-16T07:50:08Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.s390x",
"product_id": "rust-keylime-0.2.8+12-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-1.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-1.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-58266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-58266"
}
],
"notes": [
{
"category": "general",
"text": "The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \\xa0 characters, which may facilitate command injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-58266",
"url": "https://www.suse.com/security/cve/CVE-2024-58266"
},
{
"category": "external",
"summary": "SUSE Bug 1247186 for CVE-2024-58266",
"url": "https://bugzilla.suse.com/1247186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T07:50:08Z",
"details": "moderate"
}
],
"title": "CVE-2024-58266"
},
{
"cve": "CVE-2025-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3416"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in OpenSSL\u0027s handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3416",
"url": "https://www.suse.com/security/cve/CVE-2025-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1242599 for CVE-2025-3416",
"url": "https://bugzilla.suse.com/1242599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T07:50:08Z",
"details": "low"
}
],
"title": "CVE-2025-3416"
},
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.aarch64",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.s390x",
"SUSE Linux Micro 6.0:rust-keylime-0.2.8+12-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-09-16T07:50:08Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:20858-1
Vulnerability from csaf_suse
Published
2025-10-14 13:18
Modified
2025-10-14 13:18
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- CVE-2025-55159: slab: incorrect bounds check in get_disjoint_mut function can lead to undefined behavior or potential crash due to out-of-bounds access (bsc#1248006)
- CVE-2025-3416: openssl: Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242623)
- CVE-2024-58266: shlex: certain bytes allowed to appear unquoted and unescaped in command arguments (bsc#1247193)
- CVE-2024-43806: rustix: rustix::fs::Dir iterator with the linux_raw backend can cause memory explosion (bsc#1229952)
- CVE-2024-12224: idna: idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243861)
- RUSTSEC-2024-0006: Multiple issues involving quote API (bsc#1230029)
Patchnames
SUSE-SLE-Micro-6.1-300
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust-keylime",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust-keylime fixes the following issues:\n\n- CVE-2025-55159: slab: incorrect bounds check in get_disjoint_mut function can lead to undefined behavior or potential crash due to out-of-bounds access (bsc#1248006)\n- CVE-2025-3416: openssl: Use-After-Free in Md::fetch and Cipher::fetch in rust-openssl crate (bsc#1242623)\n- CVE-2024-58266: shlex: certain bytes allowed to appear unquoted and unescaped in command arguments (bsc#1247193)\n- CVE-2024-43806: rustix: rustix::fs::Dir iterator with the linux_raw backend can cause memory explosion (bsc#1229952)\n- CVE-2024-12224: idna: idna accepts Punycode labels that do not produce any non-ASCII when decoded (bsc#1243861)\n\n- RUSTSEC-2024-0006: Multiple issues involving quote API (bsc#1230029)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-300",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20858-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20858-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520858-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20858-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-October/042320.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229952",
"url": "https://bugzilla.suse.com/1229952"
},
{
"category": "self",
"summary": "SUSE Bug 1230029",
"url": "https://bugzilla.suse.com/1230029"
},
{
"category": "self",
"summary": "SUSE Bug 1242623",
"url": "https://bugzilla.suse.com/1242623"
},
{
"category": "self",
"summary": "SUSE Bug 1243861",
"url": "https://bugzilla.suse.com/1243861"
},
{
"category": "self",
"summary": "SUSE Bug 1247193",
"url": "https://bugzilla.suse.com/1247193"
},
{
"category": "self",
"summary": "SUSE Bug 1248006",
"url": "https://bugzilla.suse.com/1248006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-12224 page",
"url": "https://www.suse.com/security/cve/CVE-2024-12224/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-43806 page",
"url": "https://www.suse.com/security/cve/CVE-2024-43806/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-58266 page",
"url": "https://www.suse.com/security/cve/CVE-2024-58266/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3416/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for rust-keylime",
"tracking": {
"current_release_date": "2025-10-14T13:18:43Z",
"generator": {
"date": "2025-10-14T13:18:43Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20858-1",
"initial_release_date": "2025-10-14T13:18:43Z",
"revision_history": [
{
"date": "2025-10-14T13:18:43Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"product": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"product_id": "rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"product_id": "rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le"
},
"product_reference": "rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-12224",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-12224"
}
],
"notes": [
{
"category": "general",
"text": "Improper Validation of Unsafe Equivalence in punycode by the idna crate from Servo rust-url allows an attacker to create a punycode hostname that one part of a system might treat as distinct while another part of that system would treat as equivalent to another hostname.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-12224",
"url": "https://www.suse.com/security/cve/CVE-2024-12224"
},
{
"category": "external",
"summary": "SUSE Bug 1243848 for CVE-2024-12224",
"url": "https://bugzilla.suse.com/1243848"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-12224"
},
{
"cve": "CVE-2024-43806",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-43806"
}
],
"notes": [
{
"category": "general",
"text": "Rustix is a set of safe Rust bindings to POSIX-ish APIs. When using `rustix::fs::Dir` using the `linux_raw` backend, it\u0027s possible for the iterator to \"get stuck\" when an IO error is encountered. Combined with a memory over-allocation issue in `rustix::fs::Dir::read_more`, this can cause quick and unbounded memory explosion (gigabytes in a few seconds if used on a hot path) and eventually lead to an OOM crash of the application. The symptoms were initially discovered in https://github.com/imsnif/bandwhich/issues/284. That post has lots of details of our investigation. Full details can be read on the GHSA-c827-hfw6-qwvm repo advisory. If a program tries to access a directory with its file descriptor after the file has been unlinked (or any other action that leaves the `Dir` iterator in the stuck state), and the implementation does not break after seeing an error, it can cause a memory explosion. As an example, Linux\u0027s various virtual file systems (e.g. `/proc`, `/sys`) can contain directories that spontaneously pop in and out of existence. Attempting to iterate over them using `rustix::fs::Dir` directly or indirectly (e.g. with the `procfs` crate) can trigger this fault condition if the implementation decides to continue on errors. An attacker knowledgeable about the implementation details of a vulnerable target can therefore try to trigger this fault condition via any one or a combination of several available APIs. If successful, the application host will quickly run out of memory, after which the application will likely be terminated by an OOM killer, leading to denial of service. This issue has been addressed in release versions 0.35.15, 0.36.16, 0.37.25, and 0.38.19. Users are advised to upgrade. There are no known workarounds for this issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-43806",
"url": "https://www.suse.com/security/cve/CVE-2024-43806"
},
{
"category": "external",
"summary": "SUSE Bug 1229376 for CVE-2024-43806",
"url": "https://bugzilla.suse.com/1229376"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-43806"
},
{
"cve": "CVE-2024-58266",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-58266"
}
],
"notes": [
{
"category": "general",
"text": "The shlex crate before 1.2.1 for Rust allows unquoted and unescaped instances of the { and \\xa0 characters, which may facilitate command injection.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-58266",
"url": "https://www.suse.com/security/cve/CVE-2024-58266"
},
{
"category": "external",
"summary": "SUSE Bug 1247186 for CVE-2024-58266",
"url": "https://bugzilla.suse.com/1247186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.6,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2024-58266"
},
{
"cve": "CVE-2025-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3416"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in OpenSSL\u0027s handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3416",
"url": "https://www.suse.com/security/cve/CVE-2025-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1242599 for CVE-2025-3416",
"url": "https://bugzilla.suse.com/1242599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "low"
}
],
"title": "CVE-2025-3416"
},
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.aarch64",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.ppc64le",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.s390x",
"SUSE Linux Micro 6.1:rust-keylime-0.2.8+12-slfo.1.1_1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-14T13:18:43Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:20921-1
Vulnerability from csaf_suse
Published
2025-10-15 12:00
Modified
2025-10-15 12:00
Summary
Recommended update of flake-pilot
Notes
Title of the patch
Recommended update of flake-pilot
Description of the patch
This update for flake-pilot fixes the following issues:
Update version to 3.1.22.
- Fixes to use flakes as normal user
Running a flake is a container based instance provisioning
and startup. Some part of this process requires root permissions
for example mounting the container instance store for the
provisioning step. This commit fixes the required calls to
be properly managed by sudo.
- seed from entropy
- Fix assignment of random sequence number
We should use a seed for the sequence as described in
https://rust-random.github.io/book/guide-seeding.html#a-simple-number
In addition the logic when a random sequence number should
be used was wrong and needed a fix regarding resume and
attach type flakes which must not use a random sequence
- Pass --init option for resume type flakes
In resume mode a sleep command is used to keep the container
open. However, without the --init option there is no signal
handling available. This commit fixes it
- Revert "kill prior remove when using %remove flag"
This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.
no hard killing needed with the event loop entrypoint
- Fixed CVE-2025-55159 slab: incorrect bounds check
Update to slab 0.4.11 to fix the mentioned CVE.
This Fixes bsc#1248004
- Apply clippy fixes
- Create sequence number for the same invocation
If a flake which is not a resume or attach flake is called twice
with the same invocation arguments an error message is displayed
to give this invocation a new name via the @NAME runtime option.
This commit makes this more comfortable and automatically assigns
a random sequence number for the call if no @NAME is given.
- kill prior remove when using %remove flag
In case the container instance should be removed via the %remove
flag, send a kill first, followed by a force remove. The reason
for this is because we use a never ending sleep command as entry
point for resume type containers. If they should be removed the
standard signal send on podman rm will not stop the sleep and
after a period of 10 seconds podman sends a kill signal itself.
We can speedup this process as we know the entry point command
and send the kill signal first followed by the remove which
saves us some wait time spent in podman otherwise.
- Fix clippy hints
variables can be used directly in the format! string
- Prune old images after load
Make sure no <none> image references stay in the registry
Patchnames
SUSE-SLES-16.0-2
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Recommended update of flake-pilot",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for flake-pilot fixes the following issues:\n\nUpdate version to 3.1.22.\n\n- Fixes to use flakes as normal user\n\n Running a flake is a container based instance provisioning\n and startup. Some part of this process requires root permissions\n for example mounting the container instance store for the\n provisioning step. This commit fixes the required calls to\n be properly managed by sudo.\n\n- seed from entropy\n\n- Fix assignment of random sequence number\n\n We should use a seed for the sequence as described in\n https://rust-random.github.io/book/guide-seeding.html#a-simple-number\n In addition the logic when a random sequence number should\n be used was wrong and needed a fix regarding resume and\n attach type flakes which must not use a random sequence\n\n- Pass --init option for resume type flakes\n\n In resume mode a sleep command is used to keep the container\n open. However, without the --init option there is no signal\n handling available. This commit fixes it\n\n- Revert \"kill prior remove when using %remove flag\"\n\n This reverts commit 06c7d4aa71f74865dfecba399fd08cc2fde2e1f2.\n no hard killing needed with the event loop entrypoint\n\n- Fixed CVE-2025-55159 slab: incorrect bounds check\n\n Update to slab 0.4.11 to fix the mentioned CVE.\n This Fixes bsc#1248004\n\n- Apply clippy fixes\n\n- Create sequence number for the same invocation\n\n If a flake which is not a resume or attach flake is called twice\n with the same invocation arguments an error message is displayed\n to give this invocation a new name via the @NAME runtime option.\n This commit makes this more comfortable and automatically assigns\n a random sequence number for the call if no @NAME is given.\n\n- kill prior remove when using %remove flag\n\n In case the container instance should be removed via the %remove\n flag, send a kill first, followed by a force remove. The reason\n for this is because we use a never ending sleep command as entry\n point for resume type containers. If they should be removed the\n standard signal send on podman rm will not stop the sleep and\n after a period of 10 seconds podman sends a kill signal itself.\n We can speedup this process as we know the entry point command\n and send the kill signal first followed by the remove which\n saves us some wait time spent in podman otherwise.\n\n- Fix clippy hints\n\n variables can be used directly in the format! string\n\n- Prune old images after load\n\n Make sure no \u003cnone\u003e image references stay in the registry\n\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-2",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20921-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20921-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520921-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20921-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-November/023169.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248004",
"url": "https://bugzilla.suse.com/1248004"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Recommended update of flake-pilot",
"tracking": {
"current_release_date": "2025-10-15T12:00:25Z",
"generator": {
"date": "2025-10-15T12:00:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20921-1",
"initial_release_date": "2025-10-15T12:00:25Z",
"revision_history": [
{
"date": "2025-10-15T12:00:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-3.1.22-160000.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-3.1.22-160000.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-3.1.22-160000.1.1.s390x"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "flake-pilot-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-3.1.22-160000.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"product": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"product_id": "flake-pilot-podman-3.1.22-160000.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16.0"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-3.1.22-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "flake-pilot-podman-3.1.22-160000.1.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
},
"product_reference": "flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-3.1.22-160000.1.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 16.0:flake-pilot-podman-3.1.22-160000.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-10-15T12:00:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
suse-su-2025:02961-1
Vulnerability from csaf_suse
Published
2025-08-22 10:07
Modified
2025-08-22 10:07
Summary
Security update for rust-keylime
Notes
Title of the patch
Security update for rust-keylime
Description of the patch
This update for rust-keylime fixes the following issues:
- Update slab to version 0.4.11:
* CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)
- Update to version 0.2.8+12:
* build(deps): bump actions/checkout from 4 to 5
* build(deps): bump cfg-if from 1.0.0 to 1.0.1
* build(deps): bump openssl from 0.10.72 to 0.10.73
* build(deps): bump clap from 4.5.39 to 4.5.45
* build(deps): bump pest from 2.8.0 to 2.8.1
* Fix clippy warnings
* Use verifier-provided interval for continuous attestation timing
* Add meta object with seconds_to_next_attestation to evidence response
* Fix boot time retrieval
* Fix IMA log format (it must be ['text/plain']) (#1073)
* Remove unnecessary configuration fields
* cargo: Bump retry-policies to version 0.4.0
Patchnames
SUSE-2025-2961,SUSE-SLE-Micro-5.4-2025-2961
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rust-keylime",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rust-keylime fixes the following issues:\n\n- Update slab to version 0.4.11:\n * CVE-2025-55159: Fixed incorrect bounds check in get_disjoint_mut function (bsc#1248006)\n\n- Update to version 0.2.8+12:\n * build(deps): bump actions/checkout from 4 to 5\n * build(deps): bump cfg-if from 1.0.0 to 1.0.1\n * build(deps): bump openssl from 0.10.72 to 0.10.73\n * build(deps): bump clap from 4.5.39 to 4.5.45\n * build(deps): bump pest from 2.8.0 to 2.8.1\n * Fix clippy warnings\n * Use verifier-provided interval for continuous attestation timing\n * Add meta object with seconds_to_next_attestation to evidence response\n * Fix boot time retrieval\n * Fix IMA log format (it must be [\u0027text/plain\u0027]) (#1073)\n * Remove unnecessary configuration fields\n * cargo: Bump retry-policies to version 0.4.0\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2961,SUSE-SLE-Micro-5.4-2025-2961",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02961-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02961-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502961-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02961-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041335.html"
},
{
"category": "self",
"summary": "SUSE Bug 1248006",
"url": "https://bugzilla.suse.com/1248006"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-55159 page",
"url": "https://www.suse.com/security/cve/CVE-2025-55159/"
}
],
"title": "Security update for rust-keylime",
"tracking": {
"current_release_date": "2025-08-22T10:07:35Z",
"generator": {
"date": "2025-08-22T10:07:35Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02961-1",
"initial_release_date": "2025-08-22T10:07:35Z",
"revision_history": [
{
"date": "2025-08-22T10:07:35Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.aarch64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.aarch64",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.8.1.aarch64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"product_id": "rust-keylime-0.2.8+12-150400.3.8.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.ppc64le",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.ppc64le",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.8.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.8.1.ppc64le",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.ppc64le",
"product_id": "rust-keylime-0.2.8+12-150400.3.8.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.s390x",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.s390x",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.8.1.s390x"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"product_id": "rust-keylime-0.2.8+12-150400.3.8.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.x86_64",
"product": {
"name": "keylime-ima-policy-0.2.8+12-150400.3.8.1.x86_64",
"product_id": "keylime-ima-policy-0.2.8+12-150400.3.8.1.x86_64"
}
},
{
"category": "product_version",
"name": "rust-keylime-0.2.8+12-150400.3.8.1.x86_64",
"product": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.x86_64",
"product_id": "rust-keylime-0.2.8+12-150400.3.8.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.aarch64"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.s390x"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rust-keylime-0.2.8+12-150400.3.8.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.x86_64"
},
"product_reference": "rust-keylime-0.2.8+12-150400.3.8.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-55159",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-55159"
}
],
"notes": [
{
"category": "general",
"text": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-55159",
"url": "https://www.suse.com/security/cve/CVE-2025-55159"
},
{
"category": "external",
"summary": "SUSE Bug 1248000 for CVE-2025-55159",
"url": "https://bugzilla.suse.com/1248000"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.s390x",
"SUSE Linux Enterprise Micro 5.4:rust-keylime-0.2.8+12-150400.3.8.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-22T10:07:35Z",
"details": "moderate"
}
],
"title": "CVE-2025-55159"
}
]
}
ghsa-qx2v-8332-m4fv
Vulnerability from github
Published
2025-08-11 22:45
Modified
2025-08-12 13:17
Severity ?
VLAI Severity ?
Summary
slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check
Details
Impact
The get_disjoint_mut method in slab v0.4.10 incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes.
Patches
This has been fixed in slab v0.4.11.
Workarounds
Avoid using get_disjoint_mut with indices that might be beyond the slab's actual length, or upgrade to v0.4.11 or later.
References
{
"affected": [
{
"package": {
"ecosystem": "crates.io",
"name": "slab"
},
"ranges": [
{
"events": [
{
"introduced": "0.4.10"
},
{
"fixed": "0.4.11"
}
],
"type": "ECOSYSTEM"
}
],
"versions": [
"0.4.10"
]
}
],
"aliases": [
"CVE-2025-55159"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": true,
"github_reviewed_at": "2025-08-11T22:45:20Z",
"nvd_published_at": "2025-08-11T23:15:28Z",
"severity": "MODERATE"
},
"details": "### Impact\n\nThe `get_disjoint_mut` method in slab v0.4.10 incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes.\n\n### Patches\n\nThis has been fixed in slab v0.4.11.\n\n### Workarounds\n\nAvoid using `get_disjoint_mut` with indices that might be beyond the slab\u0027s actual length, or upgrade to v0.4.11 or later.\n\n### References\n\n- [https://github.com/tokio-rs/slab/pull/152](https://github.com/tokio-rs/slab/pull/152)",
"id": "GHSA-qx2v-8332-m4fv",
"modified": "2025-08-12T13:17:01Z",
"published": "2025-08-11T22:45:20Z",
"references": [
{
"type": "WEB",
"url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv"
},
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-55159"
},
{
"type": "WEB",
"url": "https://github.com/tokio-rs/slab/pull/152"
},
{
"type": "WEB",
"url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8"
},
{
"type": "PACKAGE",
"url": "https://github.com/tokio-rs/slab"
},
{
"type": "WEB",
"url": "https://rustsec.org/advisories/RUSTSEC-2025-0047.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "slab allows out-of-bounds access in `get_disjoint_mut` due to incorrect bounds check"
}
fkie_cve-2025-55159
Vulnerability from fkie_nvd
Published
2025-08-11 23:15
Modified
2025-08-12 14:25
Severity ?
Summary
slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab's capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab's actual length.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "slab is a pre-allocated storage for a uniform data type. In version 0.4.10, the get_disjoint_mut method incorrectly checked if indices were within the slab\u0027s capacity instead of its length, allowing access to uninitialized memory. This could lead to undefined behavior or potential crashes. This has been fixed in slab 0.4.11. A workaround for this issue involves to avoid using get_disjoint_mut with indices that might be beyond the slab\u0027s actual length."
},
{
"lang": "es",
"value": "slab es un almacenamiento preasignado para un tipo de dato uniforme. En la versi\u00f3n 0.4.10, el m\u00e9todo get_disjoint_mut verificaba incorrectamente si los \u00edndices estaban dentro de la capacidad del slab en lugar de su longitud, lo que permit\u00eda acceder a memoria no inicializada. Esto pod\u00eda provocar un comportamiento indefinido o posibles fallos. Esto se ha corregido en slab 0.4.11. Una soluci\u00f3n alternativa consiste en evitar el uso de get_disjoint_mut con \u00edndices que puedan superar la longitud real del slab."
}
],
"id": "CVE-2025-55159",
"lastModified": "2025-08-12T14:25:33.177",
"metrics": {
"cvssMetricV40": [
{
"cvssData": {
"Automatable": "NOT_DEFINED",
"Recovery": "NOT_DEFINED",
"Safety": "NOT_DEFINED",
"attackComplexity": "LOW",
"attackRequirements": "NONE",
"attackVector": "LOCAL",
"availabilityRequirement": "NOT_DEFINED",
"baseScore": 5.1,
"baseSeverity": "MEDIUM",
"confidentialityRequirement": "NOT_DEFINED",
"exploitMaturity": "NOT_DEFINED",
"integrityRequirement": "NOT_DEFINED",
"modifiedAttackComplexity": "NOT_DEFINED",
"modifiedAttackRequirements": "NOT_DEFINED",
"modifiedAttackVector": "NOT_DEFINED",
"modifiedPrivilegesRequired": "NOT_DEFINED",
"modifiedSubAvailabilityImpact": "NOT_DEFINED",
"modifiedSubConfidentialityImpact": "NOT_DEFINED",
"modifiedSubIntegrityImpact": "NOT_DEFINED",
"modifiedUserInteraction": "NOT_DEFINED",
"modifiedVulnAvailabilityImpact": "NOT_DEFINED",
"modifiedVulnConfidentialityImpact": "NOT_DEFINED",
"modifiedVulnIntegrityImpact": "NOT_DEFINED",
"privilegesRequired": "NONE",
"providerUrgency": "NOT_DEFINED",
"subAvailabilityImpact": "NONE",
"subConfidentialityImpact": "NONE",
"subIntegrityImpact": "NONE",
"userInteraction": "NONE",
"valueDensity": "NOT_DEFINED",
"vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X",
"version": "4.0",
"vulnAvailabilityImpact": "NONE",
"vulnConfidentialityImpact": "LOW",
"vulnIntegrityImpact": "NONE",
"vulnerabilityResponseEffort": "NOT_DEFINED"
},
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-08-11T23:15:28.173",
"references": [
{
"source": "security-advisories@github.com",
"url": "https://github.com/tokio-rs/slab/commit/2d65c514bc964b192bab212ddf3c1fcea4ae96b8"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/tokio-rs/slab/pull/152"
},
{
"source": "security-advisories@github.com",
"url": "https://github.com/tokio-rs/slab/security/advisories/GHSA-qx2v-8332-m4fv"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Awaiting Analysis",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "security-advisories@github.com",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…