SUSE-SU-2025:20429-1
Vulnerability from csaf_suse - Published: 2025-06-20 14:11 - Updated: 2025-06-20 14:11Summary
Security update for afterburn
Notes
Title of the patch
Security update for afterburn
Description of the patch
This update for afterburn fixes the following issues:
Update to version 5.8.2:
* cargo: Afterburn release 5.8.2
* docs/release-notes: update for release 5.8.2
* cargo: update dependencies
* cargo: Afterburn release 5.8.1
* cargo: Afterburn release 5.8.0
* docs/release-notes: update for release 5.8.0
* cargo: update dependencies
* packit: add initial support
Update to version 5.7.0.git103.bae893c:
* Sync repo templates ⚙
fixes RUSTSEC-2025-0022 AKA CVE-2025-3416
* mod.rs: Fix clippy lint errors
* release-notes.md: add release notes for rust version update
* Cargo.toml: bump MSRV to 1.84.1
* Fix clippy lint issues
* Sync repo templates ⚙
* Update release notes.
* proxmoxve: Add more context to log messages.
* proxmoxve: Remove unneeded fields
* proxmoxve: Add tests for static network configuration from cloud-init.
* proxmoxve: Add support for static network configuration from cloud-init.
* Sync repo templates ⚙
* release notes: add notes for tempfile bump from 3.16.0 to 3.17.1
* add makefile targets for fmt,lint and test
* providers/openstack: ignore ec2 metadata if not present
* Sync repo templates ⚙
* docs: add changelog entry
* proxmox: use noop provider if no configdrive
* add noop provider
* release-notes: remove "upcoming"
Update to version 5.7.0:
* cargo: Afterburn release 5.7.0
* docs/release-notes: update for release 5.7.0
* cargo: update dependencies
* dhcp: replace dbus_proxy with proxy, and zbus traits
* providers/hetzner: private ipv4 addresses in attributes
* openstack: Document the two platforms
* microsoft/azure: allow empty certificate chain in PKCS12 file
* proxmoxve: implement proxmoxve provider
* providers/hetzner: fix duplicate attribute prefix
* cargo: Afterburn release 5.6.0
* docs/release-notes: update for release 5.6.0
* cargo: update dependencies
* lint: silence deadcode warnings
* lint: address latest lint's from msrv update
* workflows/rust: directly update toolchain to 1.75.0
* cargo: update msrv to 1.75
* Sync repo templates ⚙
* providers: Add "akamai" provider
* Sync repo templates ⚙
* cargo: Afterburn release 5.5.1
* docs/release-notes: update for release 5.5.1
* cargo: update dependencies
* providers/vmware: add missing public functions for non-amd64
* cargo: Afterburn release 5.5.0
* Sync repo templates ⚙
* docs/release-notes: update for release 5.5.0
* cargo: update dependencies
* ci: cancel previous build on PR update
* providers/vmware: Process guestinfo.metadata netplan configuration
* kubevirt: Run afterburn-hostname service
* providers: add support for scaleway
* Move away from deprecated `users` to `uzers`
* Sync repo templates ⚙
* providers/hetzner: add support for Hetzner Cloud
* cargo: update MSRV to 1.71
* chore: Get rid of Clippy warnings
* cargo: specify required features for nix dependency
* Sync repo templates ⚙
* openstack: Add attribute OPENSTACK_INSTANCE_UUID
* cargo: Afterburn release 5.4.3
* docs/release-notes: update for release 5.4.3
* cargo: update dependencies
* cargo: allow openssl 0.10.46
* ci: strip debug symbols
* Sync repo templates ⚙
* build-sys: Use new tier = 2 for cargo-vendor-filterer
* Sync repo templates ⚙
* cargo: Afterburn release 5.4.2
* docs/release-notes: update for release
* docs/release-notes: note Azure SSH regression fix with new openssl
* cargo: fix minimum version of openssl crate
* microsoft/crypto/mod: replace deprecated function `parse` with `parse2`
* Update mockito to 1.0.1
* cli: switch to clap derive
* cli: add descriptive value names for option arguments in --help
* cli: have clap require exactly one of --cmdline/--provider
* providers/*: move endpoint mocking into retry::Client
* retry/client: move URL parsing into helper function
* providers/microsoft: import crate::retry
* providers/microsoft: use stored client for all fetches
* providers/packet: use stored client for boot checkin
* Sync repo templates ⚙
* docs: Use upstream theme & update to 0.4.1
* initrd: remember to write trailing newline to network kargs file
* util: drop obsolete "OEM" terminology
* Update to clap 4
* workflows: update clippy to 1.67
* Fix clippy lints
* Inline variables into format strings
Patchnames
SUSE-SLE-Micro-6.0-363
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for afterburn",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for afterburn fixes the following issues:\n\nUpdate to version 5.8.2:\n\n * cargo: Afterburn release 5.8.2\n * docs/release-notes: update for release 5.8.2\n * cargo: update dependencies\n * cargo: Afterburn release 5.8.1\n * cargo: Afterburn release 5.8.0\n * docs/release-notes: update for release 5.8.0\n * cargo: update dependencies\n * packit: add initial support\n\nUpdate to version 5.7.0.git103.bae893c:\n\n * Sync repo templates \u2699\n fixes RUSTSEC-2025-0022 AKA CVE-2025-3416\n * mod.rs: Fix clippy lint errors\n * release-notes.md: add release notes for rust version update\n * Cargo.toml: bump MSRV to 1.84.1\n * Fix clippy lint issues\n * Sync repo templates \u2699\n * Update release notes.\n * proxmoxve: Add more context to log messages.\n * proxmoxve: Remove unneeded fields\n * proxmoxve: Add tests for static network configuration from cloud-init.\n * proxmoxve: Add support for static network configuration from cloud-init.\n * Sync repo templates \u2699\n * release notes: add notes for tempfile bump from 3.16.0 to 3.17.1\n * add makefile targets for fmt,lint and test\n * providers/openstack: ignore ec2 metadata if not present\n * Sync repo templates \u2699\n * docs: add changelog entry\n * proxmox: use noop provider if no configdrive\n * add noop provider\n * release-notes: remove \"upcoming\"\n\nUpdate to version 5.7.0:\n\n * cargo: Afterburn release 5.7.0\n * docs/release-notes: update for release 5.7.0\n * cargo: update dependencies\n * dhcp: replace dbus_proxy with proxy, and zbus traits\n * providers/hetzner: private ipv4 addresses in attributes\n * openstack: Document the two platforms\n * microsoft/azure: allow empty certificate chain in PKCS12 file\n * proxmoxve: implement proxmoxve provider\n * providers/hetzner: fix duplicate attribute prefix\n * cargo: Afterburn release 5.6.0\n * docs/release-notes: update for release 5.6.0\n * cargo: update dependencies\n * lint: silence deadcode warnings\n * lint: address latest lint\u0027s from msrv update\n * workflows/rust: directly update toolchain to 1.75.0\n * cargo: update msrv to 1.75\n * Sync repo templates \u2699\n * providers: Add \"akamai\" provider\n * Sync repo templates \u2699\n * cargo: Afterburn release 5.5.1\n * docs/release-notes: update for release 5.5.1\n * cargo: update dependencies\n * providers/vmware: add missing public functions for non-amd64\n * cargo: Afterburn release 5.5.0\n * Sync repo templates \u2699\n * docs/release-notes: update for release 5.5.0\n * cargo: update dependencies\n * ci: cancel previous build on PR update\n * providers/vmware: Process guestinfo.metadata netplan configuration\n * kubevirt: Run afterburn-hostname service\n * providers: add support for scaleway\n * Move away from deprecated `users` to `uzers`\n * Sync repo templates \u2699\n * providers/hetzner: add support for Hetzner Cloud\n * cargo: update MSRV to 1.71\n * chore: Get rid of Clippy warnings\n * cargo: specify required features for nix dependency\n * Sync repo templates \u2699\n * openstack: Add attribute OPENSTACK_INSTANCE_UUID\n * cargo: Afterburn release 5.4.3\n * docs/release-notes: update for release 5.4.3\n * cargo: update dependencies\n * cargo: allow openssl 0.10.46\n * ci: strip debug symbols\n * Sync repo templates \u2699\n * build-sys: Use new tier = 2 for cargo-vendor-filterer\n * Sync repo templates \u2699\n * cargo: Afterburn release 5.4.2\n * docs/release-notes: update for release\n * docs/release-notes: note Azure SSH regression fix with new openssl\n * cargo: fix minimum version of openssl crate\n * microsoft/crypto/mod: replace deprecated function `parse` with `parse2`\n * Update mockito to 1.0.1\n * cli: switch to clap derive\n * cli: add descriptive value names for option arguments in --help\n * cli: have clap require exactly one of --cmdline/--provider\n * providers/*: move endpoint mocking into retry::Client\n * retry/client: move URL parsing into helper function\n * providers/microsoft: import crate::retry\n * providers/microsoft: use stored client for all fetches\n * providers/packet: use stored client for boot checkin\n * Sync repo templates \u2699\n * docs: Use upstream theme \u0026 update to 0.4.1\n * initrd: remember to write trailing newline to network kargs file\n * util: drop obsolete \"OEM\" terminology\n * Update to clap 4\n * workflows: update clippy to 1.67\n * Fix clippy lints\n * Inline variables into format strings\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-363",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_20429-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:20429-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202520429-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:20429-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-June/040507.html"
},
{
"category": "self",
"summary": "SUSE Bug 1244675",
"url": "https://bugzilla.suse.com/1244675"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3416 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3416/"
}
],
"title": "Security update for afterburn",
"tracking": {
"current_release_date": "2025-06-20T14:11:51Z",
"generator": {
"date": "2025-06-20T14:11:51Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:20429-1",
"initial_release_date": "2025-06-20T14:11:51Z",
"revision_history": [
{
"date": "2025-06-20T14:11:51Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-1.1.aarch64",
"product": {
"name": "afterburn-5.8.2-1.1.aarch64",
"product_id": "afterburn-5.8.2-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-dracut-5.8.2-1.1.noarch",
"product": {
"name": "afterburn-dracut-5.8.2-1.1.noarch",
"product_id": "afterburn-dracut-5.8.2-1.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "afterburn-5.8.2-1.1.x86_64",
"product": {
"name": "afterburn-5.8.2-1.1.x86_64",
"product_id": "afterburn-5.8.2-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-1.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.aarch64"
},
"product_reference": "afterburn-5.8.2-1.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-5.8.2-1.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.x86_64"
},
"product_reference": "afterburn-5.8.2-1.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "afterburn-dracut-5.8.2-1.1.noarch as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:afterburn-dracut-5.8.2-1.1.noarch"
},
"product_reference": "afterburn-dracut-5.8.2-1.1.noarch",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-3416",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3416"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in OpenSSL\u0027s handling of the properties argument in certain functions. This vulnerability can allow use-after-free exploitation, which may result in undefined behavior or incorrect property parsing, leading to OpenSSL treating the input as an empty string.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.aarch64",
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.x86_64",
"SUSE Linux Micro 6.0:afterburn-dracut-5.8.2-1.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3416",
"url": "https://www.suse.com/security/cve/CVE-2025-3416"
},
{
"category": "external",
"summary": "SUSE Bug 1242599 for CVE-2025-3416",
"url": "https://bugzilla.suse.com/1242599"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.aarch64",
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.x86_64",
"SUSE Linux Micro 6.0:afterburn-dracut-5.8.2-1.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.aarch64",
"SUSE Linux Micro 6.0:afterburn-5.8.2-1.1.x86_64",
"SUSE Linux Micro 6.0:afterburn-dracut-5.8.2-1.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-06-20T14:11:51Z",
"details": "low"
}
],
"title": "CVE-2025-3416"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…