{"document":{"aggregate_severity":{"namespace":"https://www.suse.com/support/security/rating/","text":"important"},"category":"csaf_vex","csaf_version":"2.0","distribution":{"text":"Copyright 2024 SUSE LLC. All rights reserved.","tlp":{"label":"WHITE","url":"https://www.first.org/tlp/"}},"lang":"en","notes":[{"category":"summary","text":"SUSE CVE-2025-3445","title":"Title"},{"category":"description","text":"A Path Traversal \"Zip Slip\" vulnerability has been identified in mholt/archiver in Go. This vulnerability allows using a crafted ZIP file containing path traversal symlinks to create or overwrite files with the user's privileges or application utilizing the library.\n\nWhen using the archiver.Unarchive functionality with ZIP files, like this: archiver.Unarchive(zipFile, outputDir),   A crafted ZIP file can be extracted in such a way that it writes files to the affected system with the same privileges as the application executing this vulnerable functionality. Consequently, sensitive files may be overwritten, potentially leading to privilege escalation, code execution, and other severe outcomes in some cases.\n\nIt's worth noting that a similar vulnerability was found in TAR files (CVE-2024-0406). Although a fix was implemented, it hasn't been officially released, and the affected project has since been deprecated. The successor to mholt/archiver is a new project called mholt/archives, and its initial release (v0.1.0) removes the Unarchive() functionality.","title":"Description of the CVE"},{"category":"legal_disclaimer","text":"CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).","title":"Terms of use"}],"publisher":{"category":"vendor","contact_details":"https://www.suse.com/support/security/contact/","name":"SUSE Product Security Team","namespace":"https://www.suse.com/"},"references":[{"category":"external","summary":"CVE-2025-3445","url":"https://www.suse.com/security/cve/CVE-2025-3445"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1241242 for CVE-2025-3445","url":"https://bugzilla.suse.com/1241242"},{"category":"external","summary":"Advisory link for openSUSE-SU-2025:15001-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA6XGVXNKUJ7YTTS6P27RAZUXIME7ESO/"}],"title":"SUSE CVE CVE-2025-3445","tracking":{"current_release_date":"2025-12-19T00:50:48Z","generator":{"date":"2025-04-16T02:38:17Z","engine":{"name":"cve-database.git:bin/generate-csaf-vex.pl","version":"1"}},"id":"CVE-2025-3445","initial_release_date":"2025-04-16T02:38:17Z","revision_history":[{"date":"2025-04-16T02:38:17Z","number":"2","summary":"Current version"},{"date":"2025-04-17T01:35:37Z","number":"3","summary":"Current version"},{"date":"2025-04-18T01:29:50Z","number":"4","summary":"Current version"},{"date":"2025-08-08T23:33:40Z","number":"5","summary":"Current version"},{"date":"2025-11-03T00:53:14Z","number":"6","summary":"Current version"},{"date":"2025-12-17T00:51:23Z","number":"7","summary":"description changed"},{"date":"2025-12-19T00:50:48Z","number":"8","summary":"description changed"}],"status":"interim","version":"8"}},"product_tree":{"branches":[{"branches":[{"branches":[{"category":"product_name","name":"SUSE Linux Enterprise Server 16.0","product":{"name":"SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0","product_identification_helper":{"cpe":"cpe:/o:suse:sles:16.0"}}},{"category":"product_name","name":"openSUSE Tumbleweed","product":{"name":"openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed","product_identification_helper":{"cpe":"cpe:/o:opensuse:tumbleweed"}}},{"category":"product_version","name":"forgejo-10.0.3-2.1","product":{"name":"forgejo-10.0.3-2.1","product_id":"forgejo-10.0.3-2.1","product_identification_helper":{"purl":"pkg:rpm/suse/forgejo@10.0.3-2.1"}}},{"category":"product_version","name":"forgejo-apparmor-10.0.3-2.1","product":{"name":"forgejo-apparmor-10.0.3-2.1","product_id":"forgejo-apparmor-10.0.3-2.1","product_identification_helper":{"purl":"pkg:rpm/suse/forgejo-apparmor@10.0.3-2.1"}}},{"category":"product_version","name":"forgejo-environment-to-ini-10.0.3-2.1","product":{"name":"forgejo-environment-to-ini-10.0.3-2.1","product_id":"forgejo-environment-to-ini-10.0.3-2.1","product_identification_helper":{"purl":"pkg:rpm/suse/forgejo-environment-to-ini@10.0.3-2.1"}}},{"category":"product_version","name":"forgejo-firewalld-10.0.3-2.1","product":{"name":"forgejo-firewalld-10.0.3-2.1","product_id":"forgejo-firewalld-10.0.3-2.1","product_identification_helper":{"purl":"pkg:rpm/suse/forgejo-firewalld@10.0.3-2.1"}}},{"category":"product_version","name":"forgejo-selinux-10.0.3-2.1","product":{"name":"forgejo-selinux-10.0.3-2.1","product_id":"forgejo-selinux-10.0.3-2.1","product_identification_helper":{"purl":"pkg:rpm/suse/forgejo-selinux@10.0.3-2.1"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250807T150727-1.1","product":{"name":"govulncheck-vulndb-0.0.20250807T150727-1.1","product_id":"govulncheck-vulndb-0.0.20250807T150727-1.1","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250807T150727-1.1?upstream=govulncheck-vulndb-0.0.20250807T150727-1.1.src.rpm"}}},{"category":"product_version","name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_id":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","product_identification_helper":{"purl":"pkg:rpm/suse/govulncheck-vulndb@0.0.20250814T182633-160000.1.2?upstream=govulncheck-vulndb-0.0.20250814T182633-160000.1.2.src.rpm"}}}],"category":"product_family","name":"SUSE Linux Enterprise"}],"category":"vendor","name":"SUSE"}],"relationships":[{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2 as component of SUSE Linux Enterprise Server 16.0","product_id":"SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2"},"product_reference":"govulncheck-vulndb-0.0.20250814T182633-160000.1.2","relates_to_product_reference":"SUSE Linux Enterprise Server 16.0"},{"category":"default_component_of","full_product_name":{"name":"forgejo-10.0.3-2.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:forgejo-10.0.3-2.1"},"product_reference":"forgejo-10.0.3-2.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"forgejo-apparmor-10.0.3-2.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:forgejo-apparmor-10.0.3-2.1"},"product_reference":"forgejo-apparmor-10.0.3-2.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"forgejo-environment-to-ini-10.0.3-2.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:forgejo-environment-to-ini-10.0.3-2.1"},"product_reference":"forgejo-environment-to-ini-10.0.3-2.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"forgejo-firewalld-10.0.3-2.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:forgejo-firewalld-10.0.3-2.1"},"product_reference":"forgejo-firewalld-10.0.3-2.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"forgejo-selinux-10.0.3-2.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:forgejo-selinux-10.0.3-2.1"},"product_reference":"forgejo-selinux-10.0.3-2.1","relates_to_product_reference":"openSUSE Tumbleweed"},{"category":"default_component_of","full_product_name":{"name":"govulncheck-vulndb-0.0.20250807T150727-1.1 as component of openSUSE Tumbleweed","product_id":"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250807T150727-1.1"},"product_reference":"govulncheck-vulndb-0.0.20250807T150727-1.1","relates_to_product_reference":"openSUSE Tumbleweed"}]},"vulnerabilities":[{"cve":"CVE-2025-3445","ids":[{"system_name":"SUSE CVE Page","text":"https://www.suse.com/security/cve/CVE-2025-3445"}],"notes":[{"category":"general","text":"A Path Traversal \"Zip Slip\" vulnerability has been identified in mholt/archiver in Go. This vulnerability allows using a crafted ZIP file containing path traversal symlinks to create or overwrite files with the user's privileges or application utilizing the library.\n\nWhen using the archiver.Unarchive functionality with ZIP files, like this: archiver.Unarchive(zipFile, outputDir),   A crafted ZIP file can be extracted in such a way that it writes files to the affected system with the same privileges as the application executing this vulnerable functionality. Consequently, sensitive files may be overwritten, potentially leading to privilege escalation, code execution, and other severe outcomes in some cases.\n\nIt's worth noting that a similar vulnerability was found in TAR files (CVE-2024-0406). Although a fix was implemented, it hasn't been officially released, and the affected project has since been deprecated. The successor to mholt/archiver is a new project called mholt/archives, and its initial release (v0.1.0) removes the Unarchive() functionality.","title":"CVE description"}],"product_status":{"recommended":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:forgejo-10.0.3-2.1","openSUSE Tumbleweed:forgejo-apparmor-10.0.3-2.1","openSUSE Tumbleweed:forgejo-environment-to-ini-10.0.3-2.1","openSUSE Tumbleweed:forgejo-firewalld-10.0.3-2.1","openSUSE Tumbleweed:forgejo-selinux-10.0.3-2.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250807T150727-1.1"]},"references":[{"category":"external","summary":"CVE-2025-3445","url":"https://www.suse.com/security/cve/CVE-2025-3445"},{"category":"external","summary":"SUSE Security Ratings","url":"https://www.suse.com/support/security/rating/"},{"category":"external","summary":"SUSE Bug 1241242 for CVE-2025-3445","url":"https://bugzilla.suse.com/1241242"},{"category":"external","summary":"Advisory link for openSUSE-SU-2025:15001-1","url":"https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/FA6XGVXNKUJ7YTTS6P27RAZUXIME7ESO/"}],"remediations":[{"category":"vendor_fix","details":"To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n","product_ids":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:forgejo-10.0.3-2.1","openSUSE Tumbleweed:forgejo-apparmor-10.0.3-2.1","openSUSE Tumbleweed:forgejo-environment-to-ini-10.0.3-2.1","openSUSE Tumbleweed:forgejo-firewalld-10.0.3-2.1","openSUSE Tumbleweed:forgejo-selinux-10.0.3-2.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250807T150727-1.1"]}],"scores":[{"cvss_v3":{"baseScore":8.1,"baseSeverity":"HIGH","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:H/A:L","version":"3.1"},"products":["SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2","openSUSE Tumbleweed:forgejo-10.0.3-2.1","openSUSE Tumbleweed:forgejo-apparmor-10.0.3-2.1","openSUSE Tumbleweed:forgejo-environment-to-ini-10.0.3-2.1","openSUSE Tumbleweed:forgejo-firewalld-10.0.3-2.1","openSUSE Tumbleweed:forgejo-selinux-10.0.3-2.1","openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250807T150727-1.1"]}],"threats":[{"category":"impact","date":"2025-04-14T00:00:06Z","details":"important"}],"title":"CVE-2025-3445"}]}