Metrics
Affected Vendors & Products
| Link | Providers | 
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53882 | 
                     | 
            
Wed, 03 Sep 2025 08:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-273 | 
Wed, 03 Sep 2025 07:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A Improper Check for Dropped Privileges vulnerability in the logrotate setup of openSUSE Tumbleweed mailman3 allows the mailman user to create files as root, allowing for a potential privilege escalation. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSE mailman3 package allows the mailman user to sent SIGHUP to arbitrary processes. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | 
| Title | python-mailman logrotate configuration allows potential escalation from mailman to root | The logrotate configuration in the python-mailman of openSUSE allows the mailman user to sent SIGHUP to arbitrary proceess | 
| Weaknesses | CWE-807 | 
Thu, 31 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-807 | 
Thu, 31 Jul 2025 11:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to root. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Improper Check for Dropped Privileges vulnerability in the logrotate setup of openSUSE Tumbleweed mailman3 allows the mailman user to create files as root, allowing for a potential privilege escalation. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | 
| Title | python-mailmans logrotate configuration allows potential escalation from mailman to root | python-mailman logrotate configuration allows potential escalation from mailman to root | 
| Weaknesses | CWE-273 | |
| Metrics | 
        
        
        cvssV3_1
         
  | 
    
        
        cvssV4_0
         
 
  | 
Thu, 24 Jul 2025 07:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to rootThis issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to root. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | 
Wed, 23 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | 
        
        cvssV3_1
         
 
  | 
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | 
        
        Suse
         Suse opensuse Tumbleweed  | 
|
| Vendors & Products | 
        
        Suse
         Suse opensuse Tumbleweed  | 
Wed, 23 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to rootThis issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | |
| Title | python-mailmans logrotate configuration allows potential escalation from mailman to root | |
| Weaknesses | CWE-807 | |
| References | 
         | 
Status: PUBLISHED
Assigner: suse
Published: 2025-07-23T09:31:18.547Z
Updated: 2025-09-03T07:23:06.351Z
Reserved: 2025-07-11T10:53:52.681Z
Link: CVE-2025-53882
Updated: 2025-07-23T18:31:45.853Z
Status : Awaiting Analysis
Published: 2025-07-23T10:15:24.650
Modified: 2025-09-03T08:15:31.683
Link: CVE-2025-53882
No data.
ReportizFlow