<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">openbao-2.3.1-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:15254-1</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-07-03T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-07-03T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-07-03T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">openbao-2.3.1-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the openbao-2.3.1-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-15254</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-4656/</URL>
      <Description>SUSE CVE CVE-2025-4656 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-52893/</URL>
      <Description>SUSE CVE CVE-2025-52893 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-52894/</URL>
      <Description>SUSE CVE CVE-2025-52894 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openbao-2.3.1-1.1">
      <FullProductName ProductID="openbao-2.3.1-1.1">openbao-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-agent-2.3.1-1.1">
      <FullProductName ProductID="openbao-agent-2.3.1-1.1">openbao-agent-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-cassandra-database-plugin-2.3.1-1.1">
      <FullProductName ProductID="openbao-cassandra-database-plugin-2.3.1-1.1">openbao-cassandra-database-plugin-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-influxdb-database-plugin-2.3.1-1.1">
      <FullProductName ProductID="openbao-influxdb-database-plugin-2.3.1-1.1">openbao-influxdb-database-plugin-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-mysql-database-plugin-2.3.1-1.1">
      <FullProductName ProductID="openbao-mysql-database-plugin-2.3.1-1.1">openbao-mysql-database-plugin-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-mysql-legacy-database-plugin-2.3.1-1.1">
      <FullProductName ProductID="openbao-mysql-legacy-database-plugin-2.3.1-1.1">openbao-mysql-legacy-database-plugin-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-postgresql-database-plugin-2.3.1-1.1">
      <FullProductName ProductID="openbao-postgresql-database-plugin-2.3.1-1.1">openbao-postgresql-database-plugin-2.3.1-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-server-2.3.1-1.1">
      <FullProductName ProductID="openbao-server-2.3.1-1.1">openbao-server-2.3.1-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openbao-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-2.3.1-1.1">openbao-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-agent-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-agent-2.3.1-1.1">openbao-agent-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-cassandra-database-plugin-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1">openbao-cassandra-database-plugin-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-influxdb-database-plugin-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1">openbao-influxdb-database-plugin-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-mysql-database-plugin-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1">openbao-mysql-database-plugin-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-mysql-legacy-database-plugin-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1">openbao-mysql-legacy-database-plugin-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-postgresql-database-plugin-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1">openbao-postgresql-database-plugin-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-server-2.3.1-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-server-2.3.1-1.1">openbao-server-2.3.1-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vault Community and Vault Enterprise rekey and recovery key operations can lead to a denial of service due to uncontrolled cancellation by a Vault operator. This vulnerability (CVE-2025-4656) has been remediated in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11, 1.17.17, and 1.16.22.</Note>
    </Notes>
    <CVE>CVE-2025-4656</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-4656.html</URL>
        <Description>CVE-2025-4656</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 may leak sensitive information in logs when processing malformed data. This is separate from the earlier HCSEC-2025-09 / CVE-2025-4166. This issue has been fixed in OpenBao v2.3.0 and later. Like with HCSEC-2025-09, there is no known workaround except to ensure properly formatted requests from all clients.</Note>
    </Notes>
    <CVE>CVE-2025-52893</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-52893.html</URL>
        <Description>CVE-2025-52893</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245381</URL>
        <Description>SUSE Bug 1245381</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. OpenBao before v2.3.0 allowed an attacker to perform unauthenticated, unaudited cancellation of root rekey and recovery rekey operations, effecting a denial of service. In OpenBao v2.2.0 and later, manually setting the configuration option `disable_unauthed_rekey_endpoints=true` allows an operator to deny these rarely-used endpoints on global listeners. A patch is available at commit fe75468822a22a88318c6079425357a02ae5b77b. In a future OpenBao release communicated on OpenBao's website, the maintainers will set this to `true` for all users and provide an authenticated alternative. As a workaround, if an active proxy or load balancer sits in front of OpenBao, an operator can deny requests to these endpoints from unauthorized IP ranges.</Note>
    </Notes>
    <CVE>CVE-2025-52894</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.1-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.1-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-52894.html</URL>
        <Description>CVE-2025-52894</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1245389</URL>
        <Description>SUSE Bug 1245389</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
