SUSE update for kubernetes1.24



Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2025-22872
CWE-ID CWE-20
Exploitation vector Network
Public exploit N/A
Vulnerable software
openSUSE Leap
Operating systems & Components / Operating system

kubernetes1.24-client-fish-completion
Operating systems & Components / Operating system package or component

kubernetes1.24-client-bash-completion
Operating systems & Components / Operating system package or component

kubernetes1.24-kubelet-common
Operating systems & Components / Operating system package or component

kubernetes1.24-client-common
Operating systems & Components / Operating system package or component

kubernetes1.24-apiserver
Operating systems & Components / Operating system package or component

kubernetes1.24-proxy
Operating systems & Components / Operating system package or component

kubernetes1.24-scheduler
Operating systems & Components / Operating system package or component

kubernetes1.24-kubelet
Operating systems & Components / Operating system package or component

kubernetes1.24-controller-manager
Operating systems & Components / Operating system package or component

kubernetes1.24-client
Operating systems & Components / Operating system package or component

kubernetes1.24-kubeadm
Operating systems & Components / Operating system package or component

Vendor SUSE

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Input validation error

EUVDB-ID: #VU107889

Risk: Low

CVSSv4.0: 1.7 [CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]

CVE-ID: CVE-2025-22872

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform code injection attacks.

The vulnerability exists due to insufficient validation of tags with unquoted attribute values that end with a solidus character (/). The tokenizer can interpret such tags as self-closing, leading to content following such tags as being placed in the wrong scope during DOM construction.

Mitigation

Update the affected package kubernetes1.24 to the latest version.

Vulnerable software versions

openSUSE Leap: 15.5 - 15.6

kubernetes1.24-client-fish-completion: before 1.24.17-150500.3.28.1

kubernetes1.24-client-bash-completion: before 1.24.17-150500.3.28.1

kubernetes1.24-kubelet-common: before 1.24.17-150500.3.28.1

kubernetes1.24-client-common: before 1.24.17-150500.3.28.1

kubernetes1.24-apiserver: before 1.24.17-150500.3.28.1

kubernetes1.24-proxy: before 1.24.17-150500.3.28.1

kubernetes1.24-scheduler: before 1.24.17-150500.3.28.1

kubernetes1.24-kubelet: before 1.24.17-150500.3.28.1

kubernetes1.24-controller-manager: before 1.24.17-150500.3.28.1

kubernetes1.24-client: before 1.24.17-150500.3.28.1

kubernetes1.24-kubeadm: before 1.24.17-150500.3.28.1

CPE2.3 External links

https://www.suse.com/support/update/announcement/2025/suse-su-202501941-1/


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###