Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-22438 | A Improper Check for Dropped Privileges vulnerability in the logrotate setup of openSUSE Tumbleweed mailman3 allows the mailman user to create files as root, allowing for a potential privilege escalation. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. |
| Link | Providers |
|---|---|
| https://bugzilla.suse.com/show_bug.cgi?id=CVE-2025-53882 |
|
Wed, 03 Sep 2025 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-273 |
Wed, 03 Sep 2025 07:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Improper Check for Dropped Privileges vulnerability in the logrotate setup of openSUSE Tumbleweed mailman3 allows the mailman user to create files as root, allowing for a potential privilege escalation. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSE mailman3 package allows the mailman user to sent SIGHUP to arbitrary processes. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. |
| Title | python-mailman logrotate configuration allows potential escalation from mailman to root | The logrotate configuration in the python-mailman of openSUSE allows the mailman user to sent SIGHUP to arbitrary proceess |
| Weaknesses | CWE-807 |
Thu, 31 Jul 2025 12:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-807 |
Thu, 31 Jul 2025 11:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to root. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Improper Check for Dropped Privileges vulnerability in the logrotate setup of openSUSE Tumbleweed mailman3 allows the mailman user to create files as root, allowing for a potential privilege escalation. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. |
| Title | python-mailmans logrotate configuration allows potential escalation from mailman to root | python-mailman logrotate configuration allows potential escalation from mailman to root |
| Weaknesses | CWE-273 | |
| Metrics |
cvssV3_1
|
cvssV4_0
|
Thu, 24 Jul 2025 07:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to rootThis issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to root. This issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. |
Wed, 23 Jul 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
cvssV3_1
|
Wed, 23 Jul 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Suse
Suse opensuse Tumbleweed |
|
| Vendors & Products |
Suse
Suse opensuse Tumbleweed |
Wed, 23 Jul 2025 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A Reliance on Untrusted Inputs in a Security Decision vulnerability in the logrotate configuration for openSUSEs mailman3 package allows potential escalation from mailman to rootThis issue affects openSUSE Tumbleweed: from ? before 3.3.10-2.1. | |
| Title | python-mailmans logrotate configuration allows potential escalation from mailman to root | |
| Weaknesses | CWE-807 | |
| References |
|
Status: PUBLISHED
Assigner: suse
Published:
Updated: 2026-02-26T17:50:17.345Z
Reserved: 2025-07-11T10:53:52.681Z
Link: CVE-2025-53882
Updated: 2025-07-23T18:31:45.853Z
Status : Deferred
Published: 2025-07-23T10:15:24.650
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-53882
No data.
OpenCVE Enrichment
Updated: 2025-07-23T17:35:46Z
EUVD