CVE-2025-53882
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-23

Last updated on: 2025-09-03

Assigner: SUSE

Description
A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSE mailman3 package allows the mailman user to sent SIGHUP to arbitrary processes.Β This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-23
Last Modified
2025-09-03
Generated
2026-05-07
AI Q&A
2025-07-23
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
opensuse python-mailman *
opensuse logrotate *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-807 The product uses a protection mechanism that relies on the existence or values of an input, but the input can be modified by an untrusted actor in a way that bypasses the protection mechanism.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a Reliance on Untrusted Inputs in a Security Decision within the logrotate configuration for the openSUSE mailman3 package. It allows a potential escalation of privileges from the mailman user to root, meaning an attacker could exploit this flaw to gain root-level access on the affected system.


How can this vulnerability impact me? :

If exploited, this vulnerability could allow an attacker with access to the mailman user account to escalate their privileges to root, potentially gaining full control over the affected system. This could lead to unauthorized access, modification, or deletion of data and system compromise.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart