SUSE-SU-2025:02912-1: moderate: Security update for govulncheck-vulndb

SLE-UPDATES null at suse.de
Tue Aug 19 16:30:52 UTC 2025



# Security update for govulncheck-vulndb

Announcement ID: SUSE-SU-2025:02912-1  
Release Date: 2025-08-19T12:52:35Z  
Rating: moderate  
References:

  * jsc#PED-11136

  
Cross-References:

  * CVE-2021-21411
  * CVE-2024-44906
  * CVE-2025-44779
  * CVE-2025-47907
  * CVE-2025-50738
  * CVE-2025-53534
  * CVE-2025-53942
  * CVE-2025-54386
  * CVE-2025-54388
  * CVE-2025-54410
  * CVE-2025-54424
  * CVE-2025-54576
  * CVE-2025-54799
  * CVE-2025-54801
  * CVE-2025-54996
  * CVE-2025-54997
  * CVE-2025-54998
  * CVE-2025-54999
  * CVE-2025-55000
  * CVE-2025-55001
  * CVE-2025-55003
  * CVE-2025-5999
  * CVE-2025-6000
  * CVE-2025-6004
  * CVE-2025-6011
  * CVE-2025-6013
  * CVE-2025-6014
  * CVE-2025-6015
  * CVE-2025-6037
  * CVE-2025-7195
  * CVE-2025-8341

  
CVSS scores:

  * CVE-2021-21411 ( NVD ):  5.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:L/I:L/A:N
  * CVE-2024-44906 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
  * CVE-2025-44779 ( NVD ):  6.6 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
  * CVE-2025-47907 ( SUSE ):  2.1
    CVSS:4.0/AV:L/AC:H/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-47907 ( SUSE ):  5.7 CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:N
  * CVE-2025-47907 ( NVD ):  7.0 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:L/A:L
  * CVE-2025-50738 ( NVD ):  9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-53534 ( NVD ):  7.7
    CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-53942 ( NVD ):  7.1
    CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-54386 ( NVD ):  7.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:P/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-54388 ( SUSE ):  5.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N
  * CVE-2025-54388 ( SUSE ):  5.2 CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N
  * CVE-2025-54388 ( NVD ):  5.1
    CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:N/SC:L/SI:L/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-54410 ( SUSE ):  2.4
    CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-54410 ( SUSE ):  3.9 CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:N
  * CVE-2025-54410 ( NVD ):  3.3 CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:L/I:L/A:N
  * CVE-2025-54424 ( NVD ):  8.1 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-54576 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-54799 ( NVD ):  2.3
    CVSS:4.0/AV:N/AC:H/AT:P/PR:N/UI:P/VC:H/VI:N/VA:N/SC:N/SI:N/SA:N/E:U/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-54801 ( NVD ):  8.7
    CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
  * CVE-2025-54996 ( NVD ):  7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-54997 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2025-54998 ( NVD ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  * CVE-2025-54999 ( NVD ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-54999 ( NVD ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-55000 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-55001 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-55003 ( NVD ):  5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  * CVE-2025-5999 ( NVD ):  7.2 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
  * CVE-2025-6000 ( SUSE ):  5.5
    CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:N/VI:N/VA:N/SC:H/SI:H/SA:H
  * CVE-2025-6000 ( SUSE ):  8.0 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2025-6000 ( NVD ):  9.1 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
  * CVE-2025-6004 ( NVD ):  5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
  * CVE-2025-6011 ( NVD ):  3.7 CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N
  * CVE-2025-6013 ( SUSE ):  7.4
    CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N
  * CVE-2025-6013 ( SUSE ):  6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-6013 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:N
  * CVE-2025-6014 ( NVD ):  6.5 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
  * CVE-2025-6015 ( NVD ):  5.7 CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
  * CVE-2025-6037 ( NVD ):  6.8 CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
  * CVE-2025-7195 ( NVD ):  5.2 CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:H/A:L
  * CVE-2025-8341 ( NVD ):  5.0 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N

  
Affected Products:

  * openSUSE Leap 15.6
  * SUSE Linux Enterprise Desktop 15 SP6
  * SUSE Linux Enterprise Real Time 15 SP6
  * SUSE Linux Enterprise Server 15 SP6
  * SUSE Linux Enterprise Server for SAP Applications 15 SP6
  * SUSE Package Hub 15 15-SP6

  
  
An update that solves 31 vulnerabilities and contains one feature can now be
installed.

## Description:

This update for govulncheck-vulndb fixes the following issues:

  * Update to version 0.0.20250814T182633 2025-08-14T18:26:33Z (jsc#PED-11136)

Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3765
CVE-2024-44906 GHSA-h4h6-vccr-44h2 * GO-2025-3829 CVE-2025-54410
GHSA-4vq8-7jfc-9cvp

  * Update to version 0.0.20250811T192933 2025-08-11T19:29:33Z (jsc#PED-11136)

Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3822
CVE-2025-53942 GHSA-9g4j-v8w5-7x42 * GO-2025-3829 CVE-2025-54410
GHSA-4vq8-7jfc-9cvp * GO-2025-3830 CVE-2025-54388 GHSA-x4rx-4gw3-53p4 *
GO-2025-3831 CVE-2025-50738 GHSA-hfcf-79gh-f3jc * GO-2025-3832 CVE-2021-21411
GHSA-652x-m2gr-hppm * GO-2025-3833 CVE-2025-54576 GHSA-7rh7-c77v-6434 *
GO-2025-3834 CVE-2025-54424 GHSA-8j63-96wh-wh3j * GO-2025-3835 CVE-2025-54386
GHSA-q6gg-9f92-r9wg * GO-2025-3836 CVE-2025-6037 GHSA-6c5r-4wfc-3mcx *
GO-2025-3837 CVE-2025-5999 GHSA-6h4p-m86h-hhgh * GO-2025-3838 CVE-2025-6000
GHSA-mr4h-qf9j-f665 * GO-2025-3839 CVE-2025-6011 GHSA-mwgr-84fv-3jh9 *
GO-2025-3840 CVE-2025-6004 GHSA-qgj7-fmq2-6cc4 * GO-2025-3841 CVE-2025-6014
GHSA-qv3p-fmv3-9hww * GO-2025-3842 CVE-2025-6015 GHSA-v6r4-35f9-9rpw *
GO-2025-3843 CVE-2025-8341 GHSA-3c93-92r7-j934 * GO-2025-3844 CVE-2025-53534
GHSA-fm3m-jrgm-5ppg * GO-2025-3845 CVE-2025-54801 GHSA-qx2q-88mx-vhg7 *
GO-2025-3847 CVE-2025-54799 GHSA-q82r-2j7m-9rv4 * GO-2025-3848 CVE-2025-6013
GHSA-7rx2-769v-hrwf * GO-2025-3851 CVE-2025-44779 GHSA-93jv-pvg8-hf3v *
GO-2025-3852 CVE-2025-7195 GHSA-856v-8qm2-9wjv * GO-2025-3853 CVE-2025-55000
GHSA-f7c3-mhj2-9pvg * GO-2025-3854 CVE-2025-54999 GHSA-hh28-h22f-8357 *
GO-2025-3855 CVE-2025-54998 GHSA-j3xv-7fxp-gfhx * GO-2025-3856 CVE-2025-55003
GHSA-rxp7-9q75-vj3p * GO-2025-3857 CVE-2025-54996 GHSA-vf84-mxrq-crqc *
GO-2025-3858 CVE-2025-54997 GHSA-xp75-r577-cvhp * GO-2025-3859 CVE-2025-55001
GHSA-2q8q-8fgw-9p6p

  * Update to version 0.0.20250807T150727 2025-08-07T15:07:27Z (jsc#PED-11136)

Go CVE Numbering Authority IDs added or updated with aliases: * GO-2025-3849
CVE-2025-47907

## Patch Instructions:

To install this SUSE update use the SUSE recommended installation methods like
YaST online_update or "zypper patch".  
Alternatively you can run the command listed for your product:

  * openSUSE Leap 15.6  
    zypper in -t patch openSUSE-SLE-15.6-2025-2912=1

  * SUSE Package Hub 15 15-SP6  
    zypper in -t patch SUSE-SLE-Module-Packagehub-Subpackages-15-SP6-2025-2912=1

## Package List:

  * openSUSE Leap 15.6 (noarch)
    * govulncheck-vulndb-0.0.20250814T182633-150000.1.98.1
  * SUSE Package Hub 15 15-SP6 (noarch)
    * govulncheck-vulndb-0.0.20250814T182633-150000.1.98.1

## References:

  * https://www.suse.com/security/cve/CVE-2021-21411.html
  * https://www.suse.com/security/cve/CVE-2024-44906.html
  * https://www.suse.com/security/cve/CVE-2025-44779.html
  * https://www.suse.com/security/cve/CVE-2025-47907.html
  * https://www.suse.com/security/cve/CVE-2025-50738.html
  * https://www.suse.com/security/cve/CVE-2025-53534.html
  * https://www.suse.com/security/cve/CVE-2025-53942.html
  * https://www.suse.com/security/cve/CVE-2025-54386.html
  * https://www.suse.com/security/cve/CVE-2025-54388.html
  * https://www.suse.com/security/cve/CVE-2025-54410.html
  * https://www.suse.com/security/cve/CVE-2025-54424.html
  * https://www.suse.com/security/cve/CVE-2025-54576.html
  * https://www.suse.com/security/cve/CVE-2025-54799.html
  * https://www.suse.com/security/cve/CVE-2025-54801.html
  * https://www.suse.com/security/cve/CVE-2025-54996.html
  * https://www.suse.com/security/cve/CVE-2025-54997.html
  * https://www.suse.com/security/cve/CVE-2025-54998.html
  * https://www.suse.com/security/cve/CVE-2025-54999.html
  * https://www.suse.com/security/cve/CVE-2025-55000.html
  * https://www.suse.com/security/cve/CVE-2025-55001.html
  * https://www.suse.com/security/cve/CVE-2025-55003.html
  * https://www.suse.com/security/cve/CVE-2025-5999.html
  * https://www.suse.com/security/cve/CVE-2025-6000.html
  * https://www.suse.com/security/cve/CVE-2025-6004.html
  * https://www.suse.com/security/cve/CVE-2025-6011.html
  * https://www.suse.com/security/cve/CVE-2025-6013.html
  * https://www.suse.com/security/cve/CVE-2025-6014.html
  * https://www.suse.com/security/cve/CVE-2025-6015.html
  * https://www.suse.com/security/cve/CVE-2025-6037.html
  * https://www.suse.com/security/cve/CVE-2025-7195.html
  * https://www.suse.com/security/cve/CVE-2025-8341.html
  * https://jira.suse.com/browse/PED-11136

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://lists.suse.com/pipermail/sle-updates/attachments/20250819/c77331c7/attachment.htm>


More information about the sle-updates mailing list