{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"moderate"},"category":"csaf_security_advisory","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"trivy-0.68.2-1.1 on GA media","title":"Title of the patch"},{"category":"description","text":"These are all security issues fixed in the trivy-0.68.2-1.1 package on the GA media of openSUSE Tumbleweed.","title":"Description of the patch"},{"category":"details","text":"openSUSE-Tumbleweed-2025-15852","title":"Patchnames"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"SUSE ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"self","summary":"URL of this CSAF notice","url":"https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15852-1.json"},{"category":"self","summary":"SUSE CVE CVE-2025-47911 page","url":"https://www.suse.com/security/cve/CVE-2025-47911/"},{"category":"self","summary":"SUSE CVE CVE-2025-47913 page","url":"https://www.suse.com/security/cve/CVE-2025-47913/"},{"category":"self","summary":"SUSE CVE CVE-2025-47914 page","url":"https://www.suse.com/security/cve/CVE-2025-47914/"},{"category":"self","summary":"SUSE CVE CVE-2025-58190 page","url":"https://www.suse.com/security/cve/CVE-2025-58190/"}],"title":"trivy-0.68.2-1.1 on GA media","tracking":{"current_release_date":"2025-12-29T00:00:00Z","generator":{"date":"2025-12-29T00:00:00Z","engine":{"name":"cve-database.git:bin/generate-csaf.pl","version":"1"}},"id":"openSUSE-SU-2025:15852-1","initial_release_date":"2025-12-29T00:00:00Z","revision_history":[{"date":"2025-12-29T00:00:00Z","number":"1","summary":"Current version"}],"status":"final","version":"1"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_version","name":"trivy-0.68.2-1.1.aarch64","product":{"name":"trivy-0.68.2-1.1.aarch64","product_id":"trivy-0.68.2-1.1.aarch64"}}],"category":"architecture","name":"aarch64"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-1.1.ppc64le","product":{"name":"trivy-0.68.2-1.1.ppc64le","product_id":"trivy-0.68.2-1.1.ppc64le"}}],"category":"architecture","name":"ppc64le"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-1.1.s390x","product":{"name":"trivy-0.68.2-1.1.s390x","product_id":"trivy-0.68.2-1.1.s390x"}}],"category":"architecture","name":"s390x"},{"branches":[{"category":"product_version","name":"trivy-0.68.2-1.1.x86_64","product":{"name":"trivy-0.68.2-1.1.x86_64","product_id":"trivy-0.68.2-1.1.x86_64"}}],"category":"architecture","name":"x86_64"},{"branches":[{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-1.1.aarch64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64"},"product_reference":"trivy-0.68.2-1.1.aarch64","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-1.1.ppc64le as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le"},"product_reference":"trivy-0.68.2-1.1.ppc64le","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-1.1.s390x as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x"},"product_reference":"trivy-0.68.2-1.1.s390x","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"trivy-0.68.2-1.1.x86_64 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"},"product_reference":"trivy-0.68.2-1.1.x86_64","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-47911","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47911"}],"notes":[{"category":"general","text":"The html.Parse function in golang.org/x/net/html has quadratic parsing complexity when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47911","url":"https://www.suse.com/security/cve/CVE-2025-47911"},{"category":"external","summary":"SUSE Bug 1251308 for CVE-2025-47911","url":"https://bugzilla.suse.com/1251308"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-12-29T00:00:00Z","details":"moderate"}],"title":"CVE-2025-47911"},{"cve":"CVE-2025-47913","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47913"}],"notes":[{"category":"general","text":"SSH clients receiving SSH_AGENT_SUCCESS when expecting a typed response will panic and cause early termination of the client process.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47913","url":"https://www.suse.com/security/cve/CVE-2025-47913"},{"category":"external","summary":"SUSE Bug 1253506 for CVE-2025-47913","url":"https://bugzilla.suse.com/1253506"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":7.5,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"},"products":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-12-29T00:00:00Z","details":"important"}],"title":"CVE-2025-47913"},{"cve":"CVE-2025-47914","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-47914"}],"notes":[{"category":"general","text":"SSH Agent servers do not validate the size of messages when processing new identity requests, which may cause the program to panic if the message is malformed due to an out of bounds read.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-47914","url":"https://www.suse.com/security/cve/CVE-2025-47914"},{"category":"external","summary":"SUSE Bug 1253967 for CVE-2025-47914","url":"https://bugzilla.suse.com/1253967"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-12-29T00:00:00Z","details":"moderate"}],"title":"CVE-2025-47914"},{"cve":"CVE-2025-58190","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-58190"}],"notes":[{"category":"general","text":"The html.Parse function in golang.org/x/net/html has an infinite parsing loop when processing certain inputs, which can lead to denial of service (DoS) if an attacker provides specially crafted HTML content.","title":"CVE description"}],"product_status":{"recommended":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]},"references":[{"category":"external","summary":"CVE-2025-58190","url":"https://www.suse.com/security/cve/CVE-2025-58190"},{"category":"external","summary":"SUSE Bug 1251309 for CVE-2025-58190","url":"https://bugzilla.suse.com/1251309"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"scores":[{"cvss_v3":{"baseScore":5.3,"baseSeverity":"MEDIUM","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L","version":"3.1"},"products":["openSUSE Tumbleweed:trivy-0.68.2-1.1.aarch64","openSUSE Tumbleweed:trivy-0.68.2-1.1.ppc64le","openSUSE Tumbleweed:trivy-0.68.2-1.1.s390x","openSUSE Tumbleweed:trivy-0.68.2-1.1.x86_64"]}],"threats":[{"category":"impact","date":"2025-12-29T00:00:00Z","details":"moderate"}],"title":"CVE-2025-58190"}]}