OPENSUSE-SU-2026:20044-1

Vulnerability from csaf_opensuse - Published: 2026-01-15 17:56 - Updated: 2026-01-15 17:56
Summary
Security update for alloy

Notes

Title of the patch
Security update for alloy
Description of the patch
This update for alloy fixes the following issues: Upgrade to version 1.12.1. Security issues fixed: - CVE-2025-47911: golang.org/x/net/html: quadratic complexity algorithms used when parsing untrusted HTML documents (bsc#1251509). - CVE-2025-58190: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially crafted input (bsc#1251716). - CVE-2025-47913: golang.org/x/crypto: early client process termination when receiving an unexpected message type in response to a key listing or signing request (bsc#1253609). Other updates and bugfixes: - Version 1.12.1: * Bugfixes - update to Beyla 2.7.10. - Version 1.12.0: * Breaking changes - `prometheus.exporter.blackbox`, `prometheus.exporter.snmp` and `prometheus.exporter.statsd` now use the component ID instead of the hostname as their instance label in their exported metrics. * Features - (Experimental) Add an `otelcol.receiver.cloudflare` component to receive logs pushed by Cloudflare's LogPush jobs. - (Experimental) Additions to experimental `database_observability.mysql` component: - `explain_plans` - collector now changes schema before returning the connection to the pool. - collector now passes queries more permissively. - enable `explain_plans` collector by default - (Experimental) Additions to experimental `database_observability.postgres` component: - `explain_plans` - added the explain plan collector. - collector now passes queries more permissively. - `query_samples` - add user field to wait events within `query_samples` collector. - rework the query samples collector to buffer per-query execution state across scrapes and emit finalized entries. - process turned idle rows to calculate finalization times precisely and emit first seen idle rows. - `query_details` - escape queries coming from `pg_stat_statements` with quotes. - enable `explain_plans` collector by default. - safely generate `server_id` when UDP socket used for database connection. - add table registry and include "validated" in parsed table name logs. - Add `otelcol.exporter.googlecloudpubsub` community component to export metrics, traces, and logs to Google Cloud Pub/Sub topic. - Add `structured_metadata_drop` stage for `loki.process` to filter structured metadata. - Send remote config status to the remote server for the `remotecfg` service. - Send effective config to the remote server for the `remotecfg` service. - Add a `stat_statements` configuration block to the `prometheus.exporter.postgres` component to enable selecting both the query ID and the full SQL statement. The new block includes one option to enable statement selection, and another to configure the maximum length of the statement text. - Add truncate stage for `loki.process` to truncate log entries, label values, and `structured_metadata` values. - Add `u_probe_links` & `load_probe` configuration fields to alloy `pyroscope.ebpf` to extend configuration of the `opentelemetry-ebpf-profiler` to allow uprobe profiling and dynamic probing. - Add `verbose_mode` configuration fields to `alloy pyroscope.ebpf` to be enable `ebpf-profiler` verbose mode. - Add `file_match` block to `loki.source.file` for built-in file discovery using glob patterns. - Add a regex argument to the `structured_metadata` stage in `loki.process` to extract labels matching a regular expression. - OpenTelemetry Collector dependencies upgraded from v0.134.0 to v0.139.0. - See the upstream [core](https://github.com/open-telemetry/opentelemetry-collector/blob/v0.139.0/CHANGELOG.md) and [contrib](https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/v0.139.0/CHANGELOG.md) changelogs for more details. - A new `mimir.alerts.kubernetes` component which discovers AlertmanagerConfig Kubernetes resources and loads them into a Mimir instance. - Mark `stage.windowsevent` block in the `loki.process` component as GA. * Enhancements - Add per-application rate limiting with the strategy attribute in the `faro.receiver` component, to prevent one application from consuming the rate limit quota of others. - Add support of tls in components `loki.source.(awsfirehose|gcplog|heroku|api)` and `prometheus.receive_http` and `pyroscope.receive_http`. - Remove `SendSIGKILL=no` from unit files and recommendations. - Reduce memory overhead of `prometheus.remote_write`'s WAL by lowering the size of the allocated series storage. - Reduce lock wait/contention on the `labelstore.LabelStore` by removing unecessary usage from `prometheus.relabel`. - `prometheus.exporter.postgres` dependency has been updated to v0.18.1. - Update Beyla component to 2.7.8. - Support delimiters in `stage.luhn`. - `pyroscope.java`: update `async-profiler` to 4.2. - `prometheus.exporter.unix`: Add an arp config block to configure the ARP collector. - `prometheus.exporter.snowflake` dependency has been updated to 20251016132346-6d442402afb2. - `loki.source.podlogs` now supports `preserve_discovered_labels` parameter to preserve discovered pod metadata labels for use by downstream components. - Rework underlying framework of Alloy UI to use Vite instead of Create React App. - Use POST requests for remote config requests to avoid hitting http2 header limits. - `loki.source.api` during component shutdown will now reject all the inflight requests with status code 503 after `graceful_shutdown_timeout` has expired. - `kubernetes.discovery`: Add support for attaching namespace metadata. - Add `meta_cache_address` to `beyla.ebpf` component. * Bugfixes - Stop `loki.source.kubernetes` discarding log lines with duplicate timestamps. - Fix direction of arrows for pyroscope components in UI graph. - Only log EOF errors for syslog port investigations in `loki.source.syslog` as Debug, not Warn. - Fix `prometheus.exporter.process` ignoring the `remove_empty_groups` argument. - Fix issues with "unknown series ref when trying to add exemplar" from `prometheus.remote_write` by allowing series ref links to be updated if they change. - Fix `loki.source.podlogs` component to register the Kubernetes field index for `spec.nodeName` when node filtering is enabled, preventing "Index with name `field:spec.nodeName` does not exist" errors. - Fix issue in `loki.source.file` where scheduling files could take too long. - Fix `loki.write` no longer includes internal labels __. - Fix missing native histograms custom buckets (NHCB) samples from `prometheus.remote_write`. - `otelcol.receiver.prometheus` now supports mixed histograms if `prometheus.scrape` has `honor_metadata` set to true. - `loki.source.file` has better support for non-UTF-8 encoded files. - Fix the `loki.write` endpoint block's `enable_http2` attribute to actually affect the client. - Optionally remove trailing newlines before appending entries in `stage.multiline`. - `loki.source.api` no longer drops request when relabel rules drops a specific stream.
Patchnames
openSUSE-Leap-16.0-149
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).

{
  "document": {
    "aggregate_severity": {
      "namespace": "https://www.suse.com/support/security/rating/",
      "text": "important"
    },
    "category": "csaf_security_advisory",
    "csaf_version": "2.0",
    "distribution": {
      "text": "Copyright 2024 SUSE LLC. All rights reserved.",
      "tlp": {
        "label": "WHITE",
        "url": "https://www.first.org/tlp/"
      }
    },
    "lang": "en",
    "notes": [
      {
        "category": "summary",
        "text": "Security update for alloy",
        "title": "Title of the patch"
      },
      {
        "category": "description",
        "text": "This update for alloy fixes the following issues:\n\nUpgrade to version 1.12.1.\n\n\nSecurity issues fixed:\n\n- CVE-2025-47911: golang.org/x/net/html: quadratic complexity algorithms used when parsing untrusted HTML documents\n  (bsc#1251509).\n- CVE-2025-58190: golang.org/x/net/html: excessive memory consumption by `html.ParseFragment` when processing specially\n  crafted input (bsc#1251716).\n- CVE-2025-47913: golang.org/x/crypto: early client process termination when receiving an unexpected message type in\n  response to a key listing or signing request (bsc#1253609).\n\nOther updates and bugfixes:\n\n- Version 1.12.1:\n  * Bugfixes\n    - update to Beyla 2.7.10.\n\n- Version 1.12.0:\n  * Breaking changes\n    - `prometheus.exporter.blackbox`, `prometheus.exporter.snmp` and `prometheus.exporter.statsd` now use the component\n      ID instead of the hostname as their instance label in their exported metrics.\n  * Features\n    - (Experimental) Add an `otelcol.receiver.cloudflare` component to receive logs pushed by Cloudflare\u0027s LogPush\n      jobs.\n    - (Experimental) Additions to experimental `database_observability.mysql` component:\n      - `explain_plans`\n        - collector now changes schema before returning the connection to the pool.\n        - collector now passes queries more permissively.\n      - enable `explain_plans` collector by default\n    - (Experimental) Additions to experimental `database_observability.postgres` component:\n      - `explain_plans`\n        - added the explain plan collector.\n        - collector now passes queries more permissively.\n      - `query_samples`\n        - add user field to wait events within `query_samples` collector.\n        - rework the query samples collector to buffer per-query execution state across scrapes and emit finalized\n          entries.\n        - process turned idle rows to calculate finalization times precisely and emit first seen idle rows.\n      - `query_details`\n        - escape queries coming from `pg_stat_statements` with quotes.\n      - enable `explain_plans` collector by default.\n      - safely generate `server_id` when UDP socket used for database connection.\n      - add table registry and include \"validated\" in parsed table name logs.\n    - Add `otelcol.exporter.googlecloudpubsub` community component to export metrics, traces, and logs to Google Cloud\n      Pub/Sub topic.\n    - Add `structured_metadata_drop` stage for `loki.process` to filter structured metadata.\n    - Send remote config status to the remote server for the `remotecfg` service.\n    - Send effective config to the remote server for the `remotecfg` service.\n    - Add a `stat_statements` configuration block to the `prometheus.exporter.postgres` component to enable selecting\n      both the query ID and the full SQL statement. The new block includes one option to enable statement selection,\n      and another to configure the maximum length of the statement text.\n    - Add truncate stage for `loki.process` to truncate log entries, label values, and `structured_metadata` values.\n    - Add `u_probe_links` \u0026 `load_probe` configuration fields to alloy `pyroscope.ebpf` to extend configuration of\n      the `opentelemetry-ebpf-profiler` to allow uprobe profiling and dynamic probing.\n    - Add `verbose_mode` configuration fields to `alloy pyroscope.ebpf` to be enable `ebpf-profiler` verbose mode.\n    - Add `file_match` block to `loki.source.file` for built-in file discovery using glob patterns.\n    - Add a regex argument to the `structured_metadata` stage in `loki.process` to extract labels matching a regular\n      expression.\n    - OpenTelemetry Collector dependencies upgraded from v0.134.0 to v0.139.0.\n      - See the upstream\n        [core](https://github.com/open-telemetry/opentelemetry-collector/blob/v0.139.0/CHANGELOG.md)\n        and\n        [contrib](https://github.com/open-telemetry/opentelemetry-collector-contrib/blob/v0.139.0/CHANGELOG.md)\n        changelogs for more details.\n    - A new `mimir.alerts.kubernetes` component which discovers AlertmanagerConfig Kubernetes resources and loads them\n      into a Mimir instance.\n    - Mark `stage.windowsevent` block in the `loki.process` component as GA.\n  * Enhancements\n    - Add per-application rate limiting with the strategy attribute in the `faro.receiver` component, to prevent one\n      application from consuming the rate limit quota of others.\n    - Add support of tls in components `loki.source.(awsfirehose|gcplog|heroku|api)` and `prometheus.receive_http` and\n      `pyroscope.receive_http`.\n    - Remove `SendSIGKILL=no` from unit files and recommendations.\n    - Reduce memory overhead of `prometheus.remote_write`\u0027s WAL by lowering the size of the allocated series storage.\n    - Reduce lock wait/contention on the `labelstore.LabelStore` by removing unecessary usage from\n      `prometheus.relabel`.\n    - `prometheus.exporter.postgres` dependency has been updated to v0.18.1.\n    - Update Beyla component to 2.7.8.\n    - Support delimiters in `stage.luhn`.\n    - `pyroscope.java`: update `async-profiler` to 4.2.\n    - `prometheus.exporter.unix`: Add an arp config block to configure the ARP collector.\n    - `prometheus.exporter.snowflake` dependency has been updated to 20251016132346-6d442402afb2.\n    - `loki.source.podlogs` now supports `preserve_discovered_labels` parameter to preserve discovered pod metadata\n      labels for use by downstream components.\n    - Rework underlying framework of Alloy UI to use Vite instead of Create React App.\n    - Use POST requests for remote config requests to avoid hitting http2 header limits.\n    - `loki.source.api` during component shutdown will now reject all the inflight requests with status code 503 after\n      `graceful_shutdown_timeout` has expired.\n    - `kubernetes.discovery`: Add support for attaching namespace metadata.\n    - Add `meta_cache_address` to `beyla.ebpf` component.\n  * Bugfixes\n    - Stop `loki.source.kubernetes` discarding log lines with duplicate timestamps.\n    - Fix direction of arrows for pyroscope components in UI graph.\n    - Only log EOF errors for syslog port investigations in `loki.source.syslog` as Debug, not Warn.\n    - Fix `prometheus.exporter.process` ignoring the `remove_empty_groups` argument.\n    - Fix issues with \"unknown series ref when trying to add exemplar\" from `prometheus.remote_write` by allowing\n      series ref links to be updated if they change.\n    - Fix `loki.source.podlogs` component to register the Kubernetes field index for `spec.nodeName` when node\n      filtering is enabled, preventing \"Index with name `field:spec.nodeName` does not exist\" errors.\n    - Fix issue in `loki.source.file` where scheduling files could take too long.\n    - Fix `loki.write` no longer includes internal labels __.\n    - Fix missing native histograms custom buckets (NHCB) samples from `prometheus.remote_write`.\n    - `otelcol.receiver.prometheus` now supports mixed histograms if `prometheus.scrape` has `honor_metadata` set to\n      true.\n    - `loki.source.file` has better support for non-UTF-8 encoded files.\n    - Fix the `loki.write` endpoint block\u0027s `enable_http2` attribute to actually affect the client.\n    - Optionally remove trailing newlines before appending entries in `stage.multiline`.\n    - `loki.source.api` no longer drops request when relabel rules drops a specific stream.\n",
        "title": "Description of the patch"
      },
      {
        "category": "details",
        "text": "openSUSE-Leap-16.0-149",
        "title": "Patchnames"
      },
      {
        "category": "legal_disclaimer",
        "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
        "title": "Terms of use"
      }
    ],
    "publisher": {
      "category": "vendor",
      "contact_details": "https://www.suse.com/support/security/contact/",
      "name": "SUSE Product Security Team",
      "namespace": "https://www.suse.com/"
    },
    "references": [
      {
        "category": "external",
        "summary": "SUSE ratings",
        "url": "https://www.suse.com/support/security/rating/"
      },
      {
        "category": "self",
        "summary": "URL of this CSAF notice",
        "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20044-1.json"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251509",
        "url": "https://bugzilla.suse.com/1251509"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1251716",
        "url": "https://bugzilla.suse.com/1251716"
      },
      {
        "category": "self",
        "summary": "SUSE Bug 1253609",
        "url": "https://bugzilla.suse.com/1253609"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-47911 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-47911/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-47913 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-47913/"
      },
      {
        "category": "self",
        "summary": "SUSE CVE CVE-2025-58190 page",
        "url": "https://www.suse.com/security/cve/CVE-2025-58190/"
      }
    ],
    "title": "Security update for alloy",
    "tracking": {
      "current_release_date": "2026-01-15T17:56:17Z",
      "generator": {
        "date": "2026-01-15T17:56:17Z",
        "engine": {
          "name": "cve-database.git:bin/generate-csaf.pl",
          "version": "1"
        }
      },
      "id": "openSUSE-SU-2026:20044-1",
      "initial_release_date": "2026-01-15T17:56:17Z",
      "revision_history": [
        {
          "date": "2026-01-15T17:56:17Z",
          "number": "1",
          "summary": "Current version"
        }
      ],
      "status": "final",
      "version": "1"
    }
  },
  "product_tree": {
    "branches": [
      {
        "branches": [
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alloy-1.12.1-160000.1.1.aarch64",
                "product": {
                  "name": "alloy-1.12.1-160000.1.1.aarch64",
                  "product_id": "alloy-1.12.1-160000.1.1.aarch64"
                }
              }
            ],
            "category": "architecture",
            "name": "aarch64"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alloy-1.12.1-160000.1.1.ppc64le",
                "product": {
                  "name": "alloy-1.12.1-160000.1.1.ppc64le",
                  "product_id": "alloy-1.12.1-160000.1.1.ppc64le"
                }
              }
            ],
            "category": "architecture",
            "name": "ppc64le"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alloy-1.12.1-160000.1.1.s390x",
                "product": {
                  "name": "alloy-1.12.1-160000.1.1.s390x",
                  "product_id": "alloy-1.12.1-160000.1.1.s390x"
                }
              }
            ],
            "category": "architecture",
            "name": "s390x"
          },
          {
            "branches": [
              {
                "category": "product_version",
                "name": "alloy-1.12.1-160000.1.1.x86_64",
                "product": {
                  "name": "alloy-1.12.1-160000.1.1.x86_64",
                  "product_id": "alloy-1.12.1-160000.1.1.x86_64"
                }
              }
            ],
            "category": "architecture",
            "name": "x86_64"
          },
          {
            "branches": [
              {
                "category": "product_name",
                "name": "openSUSE Leap 16.0",
                "product": {
                  "name": "openSUSE Leap 16.0",
                  "product_id": "openSUSE Leap 16.0"
                }
              }
            ],
            "category": "product_family",
            "name": "SUSE Linux Enterprise"
          }
        ],
        "category": "vendor",
        "name": "SUSE"
      }
    ],
    "relationships": [
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alloy-1.12.1-160000.1.1.aarch64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64"
        },
        "product_reference": "alloy-1.12.1-160000.1.1.aarch64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alloy-1.12.1-160000.1.1.ppc64le as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le"
        },
        "product_reference": "alloy-1.12.1-160000.1.1.ppc64le",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alloy-1.12.1-160000.1.1.s390x as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x"
        },
        "product_reference": "alloy-1.12.1-160000.1.1.s390x",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      },
      {
        "category": "default_component_of",
        "full_product_name": {
          "name": "alloy-1.12.1-160000.1.1.x86_64 as component of openSUSE Leap 16.0",
          "product_id": "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
        },
        "product_reference": "alloy-1.12.1-160000.1.1.x86_64",
        "relates_to_product_reference": "openSUSE Leap 16.0"
      }
    ]
  },
  "vulnerabilities": [
    {
      "cve": "CVE-2025-47911",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-47911"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-47911",
          "url": "https://www.suse.com/security/cve/CVE-2025-47911"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251308 for CVE-2025-47911",
          "url": "https://bugzilla.suse.com/1251308"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-15T17:56:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-47911"
    },
    {
      "cve": "CVE-2025-47913",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-47913"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-47913",
          "url": "https://www.suse.com/security/cve/CVE-2025-47913"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1253506 for CVE-2025-47913",
          "url": "https://bugzilla.suse.com/1253506"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 7.5,
            "baseSeverity": "HIGH",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-15T17:56:17Z",
          "details": "important"
        }
      ],
      "title": "CVE-2025-47913"
    },
    {
      "cve": "CVE-2025-58190",
      "ids": [
        {
          "system_name": "SUSE CVE Page",
          "text": "https://www.suse.com/security/cve/CVE-2025-58190"
        }
      ],
      "notes": [
        {
          "category": "general",
          "text": "unknown",
          "title": "CVE description"
        }
      ],
      "product_status": {
        "recommended": [
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
          "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
        ]
      },
      "references": [
        {
          "category": "external",
          "summary": "CVE-2025-58190",
          "url": "https://www.suse.com/security/cve/CVE-2025-58190"
        },
        {
          "category": "external",
          "summary": "SUSE Bug 1251309 for CVE-2025-58190",
          "url": "https://bugzilla.suse.com/1251309"
        }
      ],
      "remediations": [
        {
          "category": "vendor_fix",
          "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
          "product_ids": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "scores": [
        {
          "cvss_v3": {
            "baseScore": 5.3,
            "baseSeverity": "MEDIUM",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
            "version": "3.1"
          },
          "products": [
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.aarch64",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.ppc64le",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.s390x",
            "openSUSE Leap 16.0:alloy-1.12.1-160000.1.1.x86_64"
          ]
        }
      ],
      "threats": [
        {
          "category": "impact",
          "date": "2026-01-15T17:56:17Z",
          "details": "moderate"
        }
      ],
      "title": "CVE-2025-58190"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…