OpenSuse
Don't miss out!
Thousands of developers use stack.watch to stay informed.Get an email whenever new security vulnerabilities are reported in any OpenSuse product.
RSS Feeds for OpenSuse security vulnerabilities
Create a CVE RSS feed including security vulnerabilities found in OpenSuse products with stack.watch. Just hit watch, then grab your custom RSS feed url.
Products by OpenSuse Sorted by Most Security Vulnerabilities since 2018
By the Year
In 2026 there have been 1 vulnerability in OpenSuse. Last year, in 2025 OpenSuse had 2 security vulnerabilities published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in OpenSuse in 2026 could surpass last years number.
| Year | Vulnerabilities | Average Score |
|---|---|---|
| 2026 | 1 | 0.00 |
| 2025 | 2 | 9.30 |
| 2024 | 1 | 6.10 |
| 2023 | 10 | 7.23 |
| 2022 | 15 | 6.95 |
| 2021 | 14 | 7.05 |
| 2020 | 773 | 6.56 |
| 2019 | 652 | 7.00 |
| 2018 | 109 | 7.34 |
It may take a day or so for new OpenSuse vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.
Recent OpenSuse Security Vulnerabilities
| CVE | Date | Vulnerability | Products |
|---|---|---|---|
| CVE-2026-25701 | Feb 25, 2026 |
sdbootutil Dir Pre-Creation Vulnerability Allows Local Priv EscalationAn Insecure Temporary File vulnerability in openSUSE sdbootutil allows local users to pre-create a directory to achieve various effects like: * gain access to possible private information found in /var/lib/pcrlock.d * manipulate the data backed up in /tmp/pcrlock.d.bak, therefore violating the integrity of the data should it be restored. * overwrite protected system files with data from /var/lib/pcrlock.d by placing symlinks to existing files in the directory tree in /tmp/pcrlock.d.bak. This issue affects sdbootutil: from ? before 5880246d3a02642dc68f5c8cb474bf63cdb56bca. |
|
| CVE-2025-53881 | Oct 02, 2025 |
Exim logrotate Symlink Following P8 Escalation before 4.98.2A UNIX Symbolic Link (Symlink) Following vulnerability in logrotate config in the exim package allowed privilege escalation from mail user/group to root.This issue affects Tumbleweed: from ? before 4.98.2-lp156.248.1. |
|
| CVE-2025-32463 | Jun 30, 2025 |
Sudo <1.9.17p1 LPE via chroot /etc/nsswitch.confSudo before 1.9.17p1 allows local users to obtain root access because /etc/nsswitch.conf from a user-controlled directory is used with the --chroot option. |
|
| CVE-2024-49505 | Nov 13, 2024 |
openSUSE MirrorCache <=1.082 XSS via REGEX,PA Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in openSUSE Tumbleweed MirrorCache allows the execution of arbitrary JS via reflected XSS in the REGEX and P parameters. This issue affects MirrorCache before 1.083. |
|
| CVE-2023-32182 | Sep 19, 2023 |
SUSE Postfix Link Follow Vulnerability before 3.7.3-150500.3.5.1A Improper Link Resolution Before File Access ('Link Following') vulnerability in SUSE SUSE Linux Enterprise Desktop 15 SP5 postfix, SUSE SUSE Linux Enterprise High Performance Computing 15 SP5 postfix, SUSE openSUSE Leap 15.5 postfix.This issue affects SUSE Linux Enterprise Desktop 15 SP5: before 3.7.3-150500.3.5.1; SUSE Linux Enterprise High Performance Computing 15 SP5: before 3.7.3-150500.3.5.1; openSUSE Leap 15.5 : before 3.7.3-150500.3.5.1. |
|
| CVE-2023-32184 | Sep 19, 2023 |
Insecure Storage in opensusewelcome <0.1.9+git causes local code execA Insecure Storage of Sensitive Information vulnerability in openSUSE opensuse-welcome allows local attackers to execute code as the user that runs opensuse-welcome if a custom layout is chosen This issue affects opensuse-welcome: from 0.1 before 0.1.9+git.35.4b9444a. |
|
| CVE-2023-30078 | Aug 22, 2023 |
CVE-2023-30078 Duplicate refers to CVE-2023-32181** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-32181. Reason: This record is a duplicate of CVE-2023-32181. Notes: All CVE users should reference CVE-2023-32181 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. |
|
| CVE-2023-30079 | Aug 22, 2023 |
Duplicate CVE: Redirect to CVE-2023-22652** REJECT ** DO NOT USE THIS CVE RECORD. ConsultIDs: CVE-2023-22652. Reason: This record is a duplicate of CVE-2023-22652. Notes: All CVE users should reference CVE-2023-22652 instead of this record. All references and descriptions in this record have been removed to prevent accidental usage. |
|
| CVE-2023-32183 | Jul 07, 2023 |
hawk2: Default Perms Escalation via hacluster on openSUSEIncorrect Default Permissions vulnerability in the openSUSE Tumbleweed hawk2 package allows users with access to the hacluster to escalate to root This issue affects openSUSE Tumbleweed. |
|
| CVE-2023-32181 | Jun 01, 2023 |
libeconf Buffer Overflow Before 0.5.2 Enables DoS via Malformed ConfigA Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf allows for DoS via malformed configuration files This issue affects libeconf: before 0.5.2. |
|
| CVE-2023-22652 | Jun 01, 2023 |
Buffer Overflow in libeconf <0.5.2 via Malformed Config DoSA Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in openSUSE libeconf leads to DoS via malformed config files. This issue affects libeconf: before 0.5.2. |
|
| CVE-2022-45153 | Feb 15, 2023 |
Default Perms PrivEsc in saphanabootstrap-formula <0.13.1 on SUSEAn Incorrect Default Permissions vulnerability in saphanabootstrap-formula of SUSE Linux Enterprise Module for SAP Applications 15-SP1, SUSE Linux Enterprise Server for SAP 12-SP5; openSUSE Leap 15.4 allows local attackers to escalate to root by manipulating the sudo configuration that is created. This issue affects: SUSE Linux Enterprise Module for SAP Applications 15-SP1 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. SUSE Linux Enterprise Server for SAP 12-SP5 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. openSUSE Leap 15.4 saphanabootstrap-formula versions prior to 0.13.1+git.1667812208.4db963e. |
|
| CVE-2022-21948 | Feb 07, 2023 |
openSUSE paste XSS: JS Injection via SVG FilesAn Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in paste allows remote attackers to place Javascript into SVG files. This issue affects: openSUSE paste paste version b57b9f87e303a3db9465776e657378e96845493b and prior versions. |
|
| CVE-2022-46163 | Jan 10, 2023 |
Ransack Query Injection in openSUSE Travel Support Program (prepatched)Travel support program is a rails app to support the travel support program of openSUSE (TSP). Sensitive user data (bank account details, password Hash) can be extracted via Ransack query injection. Every deployment of travel-support-program below the patched version is affected. The travel-support-program uses the Ransack library to implement search functionality. In its default configuration, Ransack will allow for query conditions based on properties of associated database objects [1]. The `*_start`, `*_end` or `*_cont` search matchers [2] can then be abused to exfiltrate sensitive string values of associated database objects via character-by-character brute-force (A match is indicated by the returned JSON not being empty). A single bank account number can be extracted with <200 requests, a password hash can be extracted with ~1200 requests, all within a few minutes. The problem has been patched in commit d22916275c51500b4004933ff1b0a69bc807b2b7. In order to work around this issue, you can also cherry pick that patch, however it will not work without the Rails 5.0 migration that was done in #150, which in turn had quite a few pull requests it depended on. |
|
| CVE-2022-31253 | Nov 09, 2022 |
OpenLDAP2 Untrusted Path CVE-2022-31253: Local Escalation (2.6.3-404.1)A Untrusted Search Path vulnerability in openldap2 of openSUSE Factory allows local attackers with control of the ldap user or group to change ownership of arbitrary directory entries to this user/group, leading to escalation to root. This issue affects: openSUSE Factory openldap2 versions prior to 2.6.3-404.1. |
|
| CVE-2022-31256 | Oct 26, 2022 |
Link Resolution Flaw in openSUSE Factory sendmail (pre 8.17.1-1.1)A Improper Link Resolution Before File Access ('Link Following') vulnerability in a script called by the sendmail systemd service of openSUSE Factory allows local attackers to escalate from user mail to root. This issue affects: SUSE openSUSE Factory sendmail versions prior to 8.17.1-1.1. |
|
| CVE-2022-31252 | Oct 06, 2022 |
SUSE Linux chkstat Incorrect Auth on GroupWritable Paths (pre2020)A Incorrect Authorization vulnerability in chkstat of SUSE Linux Enterprise Server 12-SP5; openSUSE Leap 15.3, openSUSE Leap 15.4, openSUSE Leap Micro 5.2 did not consider group writable path components, allowing local attackers with access to a group what can write to a location included in the path to a privileged binary to influence path resolution. This issue affects: SUSE Linux Enterprise Server 12-SP5 permissions versions prior to 20170707. openSUSE Leap 15.3 permissions versions prior to 20200127. openSUSE Leap 15.4 permissions versions prior to 20201225. openSUSE Leap Micro 5.2 permissions versions prior to 20181225. |
|
| CVE-2022-31251 | Sep 07, 2022 |
openSUSE Factory Slurm testsuite: Incorrect default permissions (CVE-2022-31251)A Incorrect Default Permissions vulnerability in the packaging of the slurm testsuite of openSUSE Factory allows local attackers with control over the slurm user to escalate to root. This issue affects: openSUSE Factory slurm versions prior to 22.05.2-3.3. |
|
| CVE-2022-31250 | Jul 20, 2022 |
A UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE TumbleweedA UNIX Symbolic Link (Symlink) Following vulnerability in keylime of openSUSE Tumbleweed allows local attackers to escalate from the keylime user to root. This issue affects: openSUSE Tumbleweed keylime versions prior to 6.4.2-1.1. |
|
| CVE-2022-21949 | May 03, 2022 |
A Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build ServiceA Improper Restriction of XML External Entity Reference vulnerability in SUSE Open Build Service allows remote attackers to reference external entities in certain operations. This can be used to gain information from the server that can be abused to escalate to Admin privileges on OBS. This issue affects: SUSE Open Build Service Open Build Service versions prior to 2.10.13. |
|
| CVE-2021-36777 | Mar 09, 2022 |
A Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login formA Reliance on Untrusted Inputs in a Security Decision vulnerability in the login proxy of the openSUSE Build service allowed attackers to present users with a expected login form that then sends the clear text credentials to an attacker specified server. This issue affects: openSUSE Build service login-proxy-scripts versions prior to dc000cdfe9b9b715fb92195b1a57559362f689ef. |
|
| CVE-2021-44568 | Feb 21, 2022 |
Two heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variableTwo heap-overflow vulnerabilities exist in openSUSE/libsolv libsolv through 13 Dec 2020 in the decisionmap variable via the resolve_dependencies function at src/solver.c (line 1940 & line 1995), which could cause a remote Denial of Service. |
|
| CVE-2021-45082 | Feb 19, 2022 |
An issue was discovered in Cobbler before 3.3.1An issue was discovered in Cobbler before 3.3.1. In the templar.py file, the function check_for_invalid_imports can allow Cheetah code to import Python modules via the "#from MODULE import" substring. (Only lines beginning with #import are blocked.) |
|
| CVE-2022-0368 | Jan 26, 2022 |
Out-of-bounds Read in GitHub repository vim/vim prior to 8.2.Out-of-bounds Read in GitHub repository vim/vim prior to 8.2. |
|
| CVE-2021-36781 | Jan 14, 2022 |
A Incorrect Default Permissions vulnerability in the parsec package of openSUSE FactoryA Incorrect Default Permissions vulnerability in the parsec package of openSUSE Factory allows local attackers to imitate the service leading to DoS or clients talking to an imposter service. This issue affects: openSUSE Factory parsec versions prior to 0.8.1-1.1. |
|
| CVE-2021-46141 | Jan 06, 2022 |
An issue was discovered in uriparser before 0.9.6An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriFreeUriMembers and uriMakeOwner. |
And others... |
| CVE-2021-46142 | Jan 06, 2022 |
An issue was discovered in uriparser before 0.9.6An issue was discovered in uriparser before 0.9.6. It performs invalid free operations in uriNormalizeSyntax. |
And others... |
| CVE-2021-41819 | Jan 01, 2022 |
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie namesCGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby. |
|
| CVE-2021-41817 | Jan 01, 2022 |
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long stringDate.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1. |
|
| CVE-2021-4166 | Dec 25, 2021 |
vim is vulnerable to Out-of-bounds Readvim is vulnerable to Out-of-bounds Read |
|
| CVE-2021-33928 | Sep 02, 2021 |
Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17Buffer overflow vulnerability in function pool_installable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. |
|
| CVE-2021-33929 | Sep 02, 2021 |
Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17Buffer overflow vulnerability in function pool_disabled_solvable in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. |
|
| CVE-2021-33930 | Sep 02, 2021 |
Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17Buffer overflow vulnerability in function pool_installable_whatprovides in src/repo.h in libsolv before 0.7.17 allows attackers to cause a Denial of Service. |
|
| CVE-2021-33938 | Sep 02, 2021 |
Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17Buffer overflow vulnerability in function prune_to_recommended in src/policy.c in libsolv before 0.7.17 allows attackers to cause a Denial of Service. |
|
| CVE-2021-32000 | Jul 28, 2021 |
A UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE FactoryA UNIX Symbolic Link (Symlink) Following vulnerability in the clone-master-clean-up.sh script of clone-master-clean-up in SUSE Linux Enterprise Server 12 SP3, SUSE Linux Enterprise Server 15 SP1; openSUSE Factory allows local attackers to delete arbitrary files. This issue affects: SUSE Linux Enterprise Server 12 SP3 clone-master-clean-up version 1.6-4.6.1 and prior versions. SUSE Linux Enterprise Server 15 SP1 clone-master-clean-up version 1.6-3.9.1 and prior versions. openSUSE Factory clone-master-clean-up version 1.6-1.4 and prior versions. |
|
| CVE-2021-3200 | May 18, 2021 |
Buffer overflow vulnerability in libsolv 2020-12-13Buffer overflow vulnerability in libsolv 2020-12-13 via the Solver * testcase_read(Pool *pool, FILE *fp, const char *testcase, Queue *job, char **resultp, int *resultflagsp function at src/testcase.c: line 2334, which could cause a denial of service |
|
| CVE-2021-25319 | May 05, 2021 |
A Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE FactoryA Incorrect Default Permissions vulnerability in the packaging of virtualbox of openSUSE Factory allows local attackers in the vboxusers groupu to escalate to root. This issue affects: openSUSE Factory virtualbox version 6.1.20-1.1 and prior versions. |
|
| CVE-2021-25315 | Mar 03, 2021 |
CWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE TumbleweedCWE - CWE-287: Improper Authentication vulnerability in SUSE Linux Enterprise Server 15 SP 3; openSUSE Tumbleweed allows local attackers to execute arbitrary code via salt without the need to specify valid credentials. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. This issue affects: SUSE Linux Enterprise Server 15 SP 3 salt versions prior to 3002.2-3. openSUSE Tumbleweed salt version 3002.2-2.1 and prior versions. |
|
| CVE-2020-8032 | Feb 25, 2021 |
A Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to rootA Insecure Temporary File vulnerability in the packaging of cyrus-sasl of openSUSE Factory allows local attackers to escalate to root. This issue affects: openSUSE Factory cyrus-sasl version 2.1.27-4.2 and prior versions. |
|
| CVE-2020-8027 | Feb 11, 2021 |
A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2A Insecure Temporary File vulnerability in openldap2 of SUSE Linux Enterprise Server 15-LTSS, SUSE Linux Enterprise Server for SAP 15; openSUSE Leap 15.1, openSUSE Leap 15.2 allows local attackers to overwrite arbitrary files and gain access to the openldap2 configuration This issue affects: SUSE Linux Enterprise Server 15-LTSS openldap2 versions prior to 2.4.46-9.37.1. SUSE Linux Enterprise Server for SAP 15 openldap2 versions prior to 2.4.46-9.37.1. openSUSE Leap 15.1 openldap2 versions prior to 2.4.46-lp151.10.18.1. openSUSE Leap 15.2 openldap2 versions prior to 2.4.46-lp152.14.9.1. |
|
| CVE-2020-8031 | Feb 11, 2021 |
A Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdownA Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Open Build Service allows remote attackers to store JS code in markdown that is not properly escaped, impacting confidentiality and integrity. This issue affects: Open Build Service versions prior to 2.10.8. |
|
| CVE-2021-26676 | Feb 09, 2021 |
gdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack informationgdhcp in ConnMan before 1.39 could be used by network-adjacent attackers to leak sensitive stack information, allowing further exploitation of bugs in gdhcp. |
|
| CVE-2021-26675 | Feb 09, 2021 |
A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code.A stack-based buffer overflow in dnsproxy in ConnMan before 1.39 could be used by network adjacent attackers to execute code. |
|
| CVE-2020-0569 | Nov 23, 2020 |
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 mayOut of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access. |
|
| CVE-2020-16846 | Nov 06, 2020 |
An issue was discovered in SaltStack Salt through 3002An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection. |
|
| CVE-2020-28049 | Nov 04, 2020 |
An issue was discovered in SDDM before 0.19.0An issue was discovered in SDDM before 0.19.0. It incorrectly starts the X server in a way that - for a short time period - allows local unprivileged users to create a connection to the X server without providing proper authentication. A local attacker can thus access X server display contents and, for example, intercept keystrokes or access the clipboard. This is caused by a race condition during Xauthority file creation. |
|
| CVE-2020-16002 | Nov 03, 2020 |
Use after free in PDFium in Google Chrome prior to 86.0.4240.111Use after free in PDFium in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted PDF file. |
|
| CVE-2020-16003 | Nov 03, 2020 |
Use after free in printing in Google Chrome prior to 86.0.4240.111Use after free in printing in Google Chrome prior to 86.0.4240.111 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
|
| CVE-2020-16004 | Nov 03, 2020 |
Use after free in user interface in Google Chrome prior to 86.0.4240.183Use after free in user interface in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
|
| CVE-2020-16005 | Nov 03, 2020 |
Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183Insufficient policy enforcement in ANGLE in Google Chrome prior to 86.0.4240.183 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. |
|