Search criteria
ⓘ
Use this form to refine search results.
Full-text search supports keyword queries with ranking and filtering.
You can combine vendor, product, and sources to narrow results.
Enable “Apply ordering” to sort by date instead of relevance.
Related vulnerabilities
OPENSUSE-SU-2025:15762-1
Vulnerability from csaf_opensuse - Published: 2025-11-24 00:00 - Updated: 2025-11-24 00:00Summary
librnp0-0.18.1-1.1 on GA media
Severity
Moderate
Notes
Title of the patch: librnp0-0.18.1-1.1 on GA media
Description of the patch: These are all security issues fixed in the librnp0-0.18.1-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames: openSUSE-Tumbleweed-2025-15762
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "librnp0-0.18.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the librnp0-0.18.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15762",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15762-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13402 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13470 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13470/"
}
],
"title": "librnp0-0.18.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-24T00:00:00Z",
"generator": {
"date": "2025-11-24T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15762-1",
"initial_release_date": "2025-11-24T00:00:00Z",
"revision_history": [
{
"date": "2025-11-24T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-1.1.aarch64",
"product": {
"name": "librnp0-0.18.1-1.1.aarch64",
"product_id": "librnp0-0.18.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-1.1.aarch64",
"product": {
"name": "rnp-0.18.1-1.1.aarch64",
"product_id": "rnp-0.18.1-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-1.1.aarch64",
"product": {
"name": "rnp-devel-0.18.1-1.1.aarch64",
"product_id": "rnp-devel-0.18.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-1.1.ppc64le",
"product": {
"name": "librnp0-0.18.1-1.1.ppc64le",
"product_id": "librnp0-0.18.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-1.1.ppc64le",
"product": {
"name": "rnp-0.18.1-1.1.ppc64le",
"product_id": "rnp-0.18.1-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-1.1.ppc64le",
"product": {
"name": "rnp-devel-0.18.1-1.1.ppc64le",
"product_id": "rnp-devel-0.18.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-1.1.s390x",
"product": {
"name": "librnp0-0.18.1-1.1.s390x",
"product_id": "librnp0-0.18.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-1.1.s390x",
"product": {
"name": "rnp-0.18.1-1.1.s390x",
"product_id": "rnp-0.18.1-1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-1.1.s390x",
"product": {
"name": "rnp-devel-0.18.1-1.1.s390x",
"product_id": "rnp-devel-0.18.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-1.1.x86_64",
"product": {
"name": "librnp0-0.18.1-1.1.x86_64",
"product_id": "librnp0-0.18.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-1.1.x86_64",
"product": {
"name": "rnp-0.18.1-1.1.x86_64",
"product_id": "rnp-0.18.1-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-1.1.x86_64",
"product": {
"name": "rnp-devel-0.18.1-1.1.x86_64",
"product_id": "rnp-devel-0.18.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librnp0-0.18.1-1.1.aarch64"
},
"product_reference": "librnp0-0.18.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librnp0-0.18.1-1.1.ppc64le"
},
"product_reference": "librnp0-0.18.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librnp0-0.18.1-1.1.s390x"
},
"product_reference": "librnp0-0.18.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:librnp0-0.18.1-1.1.x86_64"
},
"product_reference": "librnp0-0.18.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-0.18.1-1.1.aarch64"
},
"product_reference": "rnp-0.18.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-0.18.1-1.1.ppc64le"
},
"product_reference": "rnp-0.18.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-0.18.1-1.1.s390x"
},
"product_reference": "rnp-0.18.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-0.18.1-1.1.x86_64"
},
"product_reference": "rnp-0.18.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.aarch64"
},
"product_reference": "rnp-devel-0.18.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.ppc64le"
},
"product_reference": "rnp-devel-0.18.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.s390x"
},
"product_reference": "rnp-devel-0.18.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.x86_64"
},
"product_reference": "rnp-devel-0.18.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13402"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13402",
"url": "https://www.suse.com/security/cve/CVE-2025-13402"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13402",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-13402"
},
{
"cve": "CVE-2025-13470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13470"
}
],
"notes": [
{
"category": "general",
"text": "In RNP version 0.18.0 a refactoring regression causes the symmetric \nsession key used for Public-Key Encrypted Session Key (PKESK) packets to\n be left uninitialized except for zeroing, resulting in it always being \nan all-zero byte array.\n\nAny data encrypted using public-key encryption \nin this release can be decrypted trivially by supplying an all-zero \nsession key, fully compromising confidentiality.\n\nThe vulnerability affects only public key encryption (PKESK packets). Passphrase-based encryption (SKESK packets) is not affected.\n\nRoot cause: Vulnerable session key buffer used in PKESK packet generation.\n\n\n\nThe defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization \nlogic inside `encrypted_build_skesk()` only randomized the key for the \nSKESK path and omitted it for the PKESK path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13470",
"url": "https://www.suse.com/security/cve/CVE-2025-13470"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13470",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:librnp0-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-0.18.1-1.1.x86_64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.aarch64",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.ppc64le",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.s390x",
"openSUSE Tumbleweed:rnp-devel-0.18.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-24T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-13470"
}
]
}
OPENSUSE-SU-2025:20116-1
Vulnerability from csaf_opensuse - Published: 2025-11-27 12:39 - Updated: 2025-11-27 12:39Summary
Security update for rnp
Severity
Moderate
Notes
Title of the patch: Security update for rnp
Description of the patch: This update for rnp fixes the following issues:
- update to 0.18.1:
* CVE-2025-13470: PKESK (public-key encrypted) session keys were
generated as all-zero, allowing trivial decryption of messages
encrypted with public keys only (boo#1253957, CVE-2025-13402)
Patchnames: openSUSE-Leap-16.0-packagehub-32
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rnp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rnp fixes the following issues:\n\n- update to 0.18.1:\n * CVE-2025-13470: PKESK (public-key encrypted) session keys were\n generated as all-zero, allowing trivial decryption of messages\n encrypted with public keys only (boo#1253957, CVE-2025-13402)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-32",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_20116-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1253957",
"url": "https://bugzilla.suse.com/1253957"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13402 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13470 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13470/"
}
],
"title": "Security update for rnp",
"tracking": {
"current_release_date": "2025-11-27T12:39:03Z",
"generator": {
"date": "2025-11-27T12:39:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:20116-1",
"initial_release_date": "2025-11-27T12:39:03Z",
"revision_history": [
{
"date": "2025-11-27T12:39:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.aarch64",
"product_id": "librnp0-0.18.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "rnp-0.18.1-bp160.1.1.aarch64",
"product_id": "rnp-0.18.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"product_id": "rnp-devel-0.18.1-bp160.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.ppc64le",
"product_id": "librnp0-0.18.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "rnp-0.18.1-bp160.1.1.ppc64le",
"product_id": "rnp-0.18.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"product_id": "rnp-devel-0.18.1-bp160.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.s390x",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.s390x",
"product_id": "librnp0-0.18.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.s390x",
"product": {
"name": "rnp-0.18.1-bp160.1.1.s390x",
"product_id": "rnp-0.18.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.s390x",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.s390x",
"product_id": "rnp-devel-0.18.1-bp160.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.x86_64",
"product_id": "librnp0-0.18.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "rnp-0.18.1-bp160.1.1.x86_64",
"product_id": "rnp-0.18.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"product_id": "rnp-devel-0.18.1-bp160.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "rnp-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "rnp-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x"
},
"product_reference": "rnp-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "rnp-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13402"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13402",
"url": "https://www.suse.com/security/cve/CVE-2025-13402"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13402",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T12:39:03Z",
"details": "important"
}
],
"title": "CVE-2025-13402"
},
{
"cve": "CVE-2025-13470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13470"
}
],
"notes": [
{
"category": "general",
"text": "In RNP version 0.18.0 a refactoring regression causes the symmetric \nsession key used for Public-Key Encrypted Session Key (PKESK) packets to\n be left uninitialized except for zeroing, resulting in it always being \nan all-zero byte array.\n\nAny data encrypted using public-key encryption \nin this release can be decrypted trivially by supplying an all-zero \nsession key, fully compromising confidentiality.\n\nThe vulnerability affects only public key encryption (PKESK packets). Passphrase-based encryption (SKESK packets) is not affected.\n\nRoot cause: Vulnerable session key buffer used in PKESK packet generation.\n\n\n\nThe defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization \nlogic inside `encrypted_build_skesk()` only randomized the key for the \nSKESK path and omitted it for the PKESK path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13470",
"url": "https://www.suse.com/security/cve/CVE-2025-13470"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13470",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T12:39:03Z",
"details": "important"
}
],
"title": "CVE-2025-13470"
}
]
}
OPENSUSE-SU-2025-20116-1
Vulnerability from csaf_opensuse - Published: 2025-11-27 12:39 - Updated: 2025-11-27 12:39Summary
Security update for rnp
Severity
Moderate
Notes
Title of the patch: Security update for rnp
Description of the patch: This update for rnp fixes the following issues:
- update to 0.18.1:
* CVE-2025-13470: PKESK (public-key encrypted) session keys were
generated as all-zero, allowing trivial decryption of messages
encrypted with public keys only (boo#1253957, CVE-2025-13402)
Patchnames: openSUSE-Leap-16.0-packagehub-32
Terms of use: CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
Vendor Fix
To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or "zypper patch".
References
| URL | Category | ||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for rnp",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for rnp fixes the following issues:\n\n- update to 0.18.1:\n * CVE-2025-13470: PKESK (public-key encrypted) session keys were\n generated as all-zero, allowing trivial decryption of messages\n encrypted with public keys only (boo#1253957, CVE-2025-13402)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-packagehub-32",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025-20116-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1253957",
"url": "https://bugzilla.suse.com/1253957"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13402 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13402/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-13470 page",
"url": "https://www.suse.com/security/cve/CVE-2025-13470/"
}
],
"title": "Security update for rnp",
"tracking": {
"current_release_date": "2025-11-27T12:39:03Z",
"generator": {
"date": "2025-11-27T12:39:03Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025-20116-1",
"initial_release_date": "2025-11-27T12:39:03Z",
"revision_history": [
{
"date": "2025-11-27T12:39:03Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.aarch64",
"product_id": "librnp0-0.18.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "rnp-0.18.1-bp160.1.1.aarch64",
"product_id": "rnp-0.18.1-bp160.1.1.aarch64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"product_id": "rnp-devel-0.18.1-bp160.1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.ppc64le",
"product_id": "librnp0-0.18.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "rnp-0.18.1-bp160.1.1.ppc64le",
"product_id": "rnp-0.18.1-bp160.1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"product_id": "rnp-devel-0.18.1-bp160.1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.s390x",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.s390x",
"product_id": "librnp0-0.18.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.s390x",
"product": {
"name": "rnp-0.18.1-bp160.1.1.s390x",
"product_id": "rnp-0.18.1-bp160.1.1.s390x"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.s390x",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.s390x",
"product_id": "rnp-devel-0.18.1-bp160.1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "librnp0-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "librnp0-0.18.1-bp160.1.1.x86_64",
"product_id": "librnp0-0.18.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "rnp-0.18.1-bp160.1.1.x86_64",
"product_id": "rnp-0.18.1-bp160.1.1.x86_64"
}
},
{
"category": "product_version",
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"product": {
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"product_id": "rnp-devel-0.18.1-bp160.1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "librnp0-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "librnp0-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "rnp-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "rnp-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x"
},
"product_reference": "rnp-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "rnp-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "rnp-devel-0.18.1-bp160.1.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
},
"product_reference": "rnp-devel-0.18.1-bp160.1.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-13402",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13402"
}
],
"notes": [
{
"category": "general",
"text": "unknown",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13402",
"url": "https://www.suse.com/security/cve/CVE-2025-13402"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13402",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T12:39:03Z",
"details": "important"
}
],
"title": "CVE-2025-13402"
},
{
"cve": "CVE-2025-13470",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-13470"
}
],
"notes": [
{
"category": "general",
"text": "In RNP version 0.18.0 a refactoring regression causes the symmetric \nsession key used for Public-Key Encrypted Session Key (PKESK) packets to\n be left uninitialized except for zeroing, resulting in it always being \nan all-zero byte array.\n\nAny data encrypted using public-key encryption \nin this release can be decrypted trivially by supplying an all-zero \nsession key, fully compromising confidentiality.\n\nThe vulnerability affects only public key encryption (PKESK packets). Passphrase-based encryption (SKESK packets) is not affected.\n\nRoot cause: Vulnerable session key buffer used in PKESK packet generation.\n\n\n\nThe defect was introduced in commit `7bd9a8dc356aae756b40755be76d36205b6b161a` where initialization \nlogic inside `encrypted_build_skesk()` only randomized the key for the \nSKESK path and omitted it for the PKESK path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-13470",
"url": "https://www.suse.com/security/cve/CVE-2025-13470"
},
{
"category": "external",
"summary": "SUSE Bug 1253957 for CVE-2025-13470",
"url": "https://bugzilla.suse.com/1253957"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:librnp0-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-0.18.1-bp160.1.1.x86_64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.aarch64",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.ppc64le",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.s390x",
"openSUSE Leap 16.0:rnp-devel-0.18.1-bp160.1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-27T12:39:03Z",
"details": "important"
}
],
"title": "CVE-2025-13470"
}
]
}