vulnerability
SUSE: CVE-2025-4748: SUSE Linux Security Advisory
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 3 | (AV:L/AC:M/Au:N/C:N/I:P/A:P) | Jun 16, 2025 | Jul 17, 2025 | Jan 16, 2026 |
Severity
3
CVSS
(AV:L/AC:M/Au:N/C:N/I:P/A:P)
Published
Jun 16, 2025
Added
Jul 17, 2025
Modified
Jan 16, 2026
Description
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.
This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.
Solutions
suse-upgrade-erlangsuse-upgrade-erlang-debuggersuse-upgrade-erlang-debugger-srcsuse-upgrade-erlang-dialyzersuse-upgrade-erlang-dialyzer-srcsuse-upgrade-erlang-diametersuse-upgrade-erlang-diameter-srcsuse-upgrade-erlang-docsuse-upgrade-erlang-epmdsuse-upgrade-erlang-etsuse-upgrade-erlang-et-srcsuse-upgrade-erlang-jinterfacesuse-upgrade-erlang-jinterface-srcsuse-upgrade-erlang-observersuse-upgrade-erlang-observer-srcsuse-upgrade-erlang-reltoolsuse-upgrade-erlang-reltool-srcsuse-upgrade-erlang-srcsuse-upgrade-erlang-wxsuse-upgrade-erlang-wx-srcsuse-upgrade-erlang26suse-upgrade-erlang26-debuggersuse-upgrade-erlang26-debugger-srcsuse-upgrade-erlang26-dialyzersuse-upgrade-erlang26-dialyzer-srcsuse-upgrade-erlang26-diametersuse-upgrade-erlang26-diameter-srcsuse-upgrade-erlang26-docsuse-upgrade-erlang26-epmdsuse-upgrade-erlang26-etsuse-upgrade-erlang26-et-srcsuse-upgrade-erlang26-jinterfacesuse-upgrade-erlang26-jinterface-srcsuse-upgrade-erlang26-observersuse-upgrade-erlang26-observer-srcsuse-upgrade-erlang26-reltoolsuse-upgrade-erlang26-reltool-srcsuse-upgrade-erlang26-srcsuse-upgrade-erlang26-wxsuse-upgrade-erlang26-wx-src
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.