<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns="http://www.icasi.org/CVRF/schema/cvrf/1.1" xmlns:cvrf="http://www.icasi.org/CVRF/schema/cvrf/1.1">
  <DocumentTitle xml:lang="en">openbao-2.3.2-1.1 on GA media</DocumentTitle>
  <DocumentType>SUSE Patch</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>openSUSE-SU-2025:16522</ID>
    </Identification>
    <Status>Final</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>1</Number>
        <Date>2025-08-18T00:00:00Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-08-18T00:00:00Z</InitialReleaseDate>
    <CurrentReleaseDate>2025-08-18T00:00:00Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf.pl</Engine>
      <Date>2017-02-24T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="Topic" Type="Summary" Ordinal="1" xml:lang="en">openbao-2.3.2-1.1 on GA media</Note>
    <Note Title="Details" Type="General" Ordinal="2" xml:lang="en">These are all security issues fixed in the openbao-2.3.2-1.1 package on the GA media of openSUSE Tumbleweed.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="3" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
    <Note Title="Patchnames" Type="Details" Ordinal="4" xml:lang="en">openSUSE-Tumbleweed-2025-16522</Note>
  </DocumentNotes>
  <DocumentDistribution xml:lang="en">Copyright SUSE LLC under the Creative Commons License 4.0 with Attribution (CC-BY-4.0)</DocumentDistribution>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-54996/</URL>
      <Description>SUSE CVE CVE-2025-54996 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55000/</URL>
      <Description>SUSE CVE CVE-2025-55000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-55003/</URL>
      <Description>SUSE CVE CVE-2025-55003 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-5999/</URL>
      <Description>SUSE CVE CVE-2025-5999 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6000/</URL>
      <Description>SUSE CVE CVE-2025-6000 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6004/</URL>
      <Description>SUSE CVE CVE-2025-6004 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6010/</URL>
      <Description>SUSE CVE CVE-2025-6010 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6011/</URL>
      <Description>SUSE CVE CVE-2025-6011 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6013/</URL>
      <Description>SUSE CVE CVE-2025-6013 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6014/</URL>
      <Description>SUSE CVE CVE-2025-6014 page</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/security/cve/CVE-2025-6015/</URL>
      <Description>SUSE CVE CVE-2025-6015 page</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://www.icasi.org/CVRF/schema/prod/1.1">
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="openbao-2.3.2-1.1">
      <FullProductName ProductID="openbao-2.3.2-1.1">openbao-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-agent-2.3.2-1.1">
      <FullProductName ProductID="openbao-agent-2.3.2-1.1">openbao-agent-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-cassandra-database-plugin-2.3.2-1.1">
      <FullProductName ProductID="openbao-cassandra-database-plugin-2.3.2-1.1">openbao-cassandra-database-plugin-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-influxdb-database-plugin-2.3.2-1.1">
      <FullProductName ProductID="openbao-influxdb-database-plugin-2.3.2-1.1">openbao-influxdb-database-plugin-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-mysql-database-plugin-2.3.2-1.1">
      <FullProductName ProductID="openbao-mysql-database-plugin-2.3.2-1.1">openbao-mysql-database-plugin-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-mysql-legacy-database-plugin-2.3.2-1.1">
      <FullProductName ProductID="openbao-mysql-legacy-database-plugin-2.3.2-1.1">openbao-mysql-legacy-database-plugin-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-postgresql-database-plugin-2.3.2-1.1">
      <FullProductName ProductID="openbao-postgresql-database-plugin-2.3.2-1.1">openbao-postgresql-database-plugin-2.3.2-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="openbao-server-2.3.2-1.1">
      <FullProductName ProductID="openbao-server-2.3.2-1.1">openbao-server-2.3.2-1.1</FullProductName>
    </Branch>
    <Relationship ProductReference="openbao-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-2.3.2-1.1">openbao-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-agent-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-agent-2.3.2-1.1">openbao-agent-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-cassandra-database-plugin-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1">openbao-cassandra-database-plugin-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-influxdb-database-plugin-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1">openbao-influxdb-database-plugin-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-mysql-database-plugin-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1">openbao-mysql-database-plugin-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-mysql-legacy-database-plugin-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1">openbao-mysql-legacy-database-plugin-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-postgresql-database-plugin-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1">openbao-postgresql-database-plugin-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
    <Relationship ProductReference="openbao-server-2.3.2-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:openbao-server-2.3.2-1.1">openbao-server-2.3.2-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, accounts with access to highly-privileged identity entity systems in root namespaces were able to increase their scope directly to the root policy. While the identity system allowed adding arbitrary policies, which in turn could contain capability grants on arbitrary paths, the root policy was restricted to manual generation using unseal or recovery key shares. The global root policy was not accessible from child namespaces. This issue is fixed in version 2.3.2. To workaround this vulnerability, use of denied_parameters in any policy which has access to the affected identity endpoints (on identity entities) may be sufficient to prohibit this type of attack.</Note>
    </Notes>
    <CVE>CVE-2025-54996</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-54996.html</URL>
        <Description>CVE-2025-54996</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247888</URL>
        <Description>SUSE Bug 1247888</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="2">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 0.1.0 through 2.3.1, OpenBao's TOTP secrets engine could accept valid codes multiple times rather than strictly-once. This was caused by unexpected normalization in the underlying TOTP library. To work around, ensure that all codes are first normalized before submitting to the OpenBao endpoint. TOTP code verification is a privileged action; only trusted systems should be verifying codes.</Note>
    </Notes>
    <CVE>CVE-2025-55000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55000.html</URL>
        <Description>CVE-2025-55000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247892</URL>
        <Description>SUSE Bug 1247892</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="3">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">OpenBao exists to provide a software solution to manage, store, and distribute sensitive data including secrets, certificates, and keys. In versions 2.3.1 and below, OpenBao's Login Multi-Factor Authentication (MFA) system allows enforcing MFA using Time-based One Time Password (TOTP). Due to normalization applied by the underlying TOTP library, codes were accepted which could contain whitespace; this whitespace could bypass internal rate limiting of the MFA method and allow reuse of existing MFA codes. This issue was fixed in version 2.3.2. To work around this, use of rate-limiting quotas can limit an attacker's ability to exploit this: https://openbao.org/api-docs/system/rate-limit-quotas/.</Note>
    </Notes>
    <CVE>CVE-2025-55003</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-55003.html</URL>
        <Description>CVE-2025-55003</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247894</URL>
        <Description>SUSE Bug 1247894</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="4">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A privileged Vault operator with write permissions to the root namespace's identity endpoint could escalate their own or another user's token privileges to Vault's root policy. Fixed in Vault Community Edition 1.20.0 and Vault Enterprise 1.20.0, 1.19.6, 1.18.11 and 1.16.22.</Note>
    </Notes>
    <CVE>CVE-2025-5999</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-5999.html</URL>
        <Description>CVE-2025-5999</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="5">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A privileged Vault operator within the root namespace with write permission to {{sys/audit}} may obtain code execution on the underlying host if a plugin directory is set in Vault's configuration. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.</Note>
    </Notes>
    <CVE>CVE-2025-6000</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>important</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6000.html</URL>
        <Description>CVE-2025-6000</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247546</URL>
        <Description>SUSE Bug 1247546</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="6">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vault and Vault Enterprise's ("Vault") user lockout feature could be bypassed for Userpass and LDAP authentication methods. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.</Note>
    </Notes>
    <CVE>CVE-2025-6004</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6004.html</URL>
        <Description>CVE-2025-6004</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="7">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">unknown</Note>
    </Notes>
    <CVE>CVE-2025-6010</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6010.html</URL>
        <Description>CVE-2025-6010</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="8">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">A timing side channel in Vault and Vault Enterprise's ("Vault") userpass auth method allowed an attacker to distinguish between existing and non-existing users, and potentially enumerate valid usernames for Vault's Userpass auth method. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.</Note>
    </Notes>
    <CVE>CVE-2025-6011</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>low</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6011.html</URL>
        <Description>CVE-2025-6011</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="9">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vault and Vault Enterprise's ("Vault") ldap auth method may not have correctly enforced MFA if username_as_alias was set to true and a user had multiple CNs that are equal but with leading or trailing spaces. Fixed in Vault Community Edition 1.20.2 and Vault Enterprise 1.20.2, 1.19.8, 1.18.13, and 1.16.24.</Note>
    </Notes>
    <CVE>CVE-2025-6013</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6013.html</URL>
        <Description>CVE-2025-6013</Description>
      </Reference>
      <Reference>
        <URL>https://bugzilla.suse.com/1247698</URL>
        <Description>SUSE Bug 1247698</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="10">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vault and Vault Enterprise's ("Vault") TOTP Secrets Engine code validation endpoint is susceptible to code reuse within its validity period. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.</Note>
    </Notes>
    <CVE>CVE-2025-6014</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6014.html</URL>
        <Description>CVE-2025-6014</Description>
      </Reference>
    </References>
  </Vulnerability>
  <Vulnerability xmlns="http://www.icasi.org/CVRF/schema/vuln/1.1" Ordinal="11">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">Vault and Vault Enterprise's ("Vault") login MFA rate limits could be bypassed and TOTP tokens could be reused. Fixed in Vault Community Edition 1.20.1 and Vault Enterprise 1.20.1, 1.19.7, 1.18.12, and 1.16.23.</Note>
    </Notes>
    <CVE>CVE-2025-6015</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>openSUSE Tumbleweed:openbao-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-agent-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-cassandra-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-influxdb-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-mysql-legacy-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-postgresql-database-plugin-2.3.2-1.1</ProductID>
        <ProductID>openSUSE Tumbleweed:openbao-server-2.3.2-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>moderate</Description>
      </Threat>
    </Threats>
    <Remediations>
      <Remediation Type="Vendor Fix">
        <Description xml:lang="en">To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
</Description>
        <URL/>
      </Remediation>
    </Remediations>
    <References>
      <Reference>
        <URL>https://www.suse.com/security/cve/CVE-2025-6015.html</URL>
        <Description>CVE-2025-6015</Description>
      </Reference>
    </References>
  </Vulnerability>
</cvrfdoc>
