vulnerability

SUSE: CVE-2025-4748: SUSE Linux Security Advisory

Severity
3
CVSS
(AV:L/AC:M/Au:N/C:N/I:P/A:P)
Published
Jun 16, 2025
Added
Jul 17, 2025
Modified
Jan 16, 2026

Description

Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in Erlang OTP (stdlib modules) allows Absolute Path Traversal, File Manipulation. This vulnerability is associated with program files lib/stdlib/src/zip.erl and program routines zip:unzip/1, zip:unzip/2, zip:extract/1, zip:extract/2 unless the memory option is passed.

This issue affects OTP from OTP 17.0 until OTP 28.0.1, OTP 27.3.4.1 and OTP 26.2.5.13, corresponding to stdlib from 2.0 until 7.0.1, 6.2.2.1 and 5.2.3.4.

Solutions

suse-upgrade-erlangsuse-upgrade-erlang-debuggersuse-upgrade-erlang-debugger-srcsuse-upgrade-erlang-dialyzersuse-upgrade-erlang-dialyzer-srcsuse-upgrade-erlang-diametersuse-upgrade-erlang-diameter-srcsuse-upgrade-erlang-docsuse-upgrade-erlang-epmdsuse-upgrade-erlang-etsuse-upgrade-erlang-et-srcsuse-upgrade-erlang-jinterfacesuse-upgrade-erlang-jinterface-srcsuse-upgrade-erlang-observersuse-upgrade-erlang-observer-srcsuse-upgrade-erlang-reltoolsuse-upgrade-erlang-reltool-srcsuse-upgrade-erlang-srcsuse-upgrade-erlang-wxsuse-upgrade-erlang-wx-srcsuse-upgrade-erlang26suse-upgrade-erlang26-debuggersuse-upgrade-erlang26-debugger-srcsuse-upgrade-erlang26-dialyzersuse-upgrade-erlang26-dialyzer-srcsuse-upgrade-erlang26-diametersuse-upgrade-erlang26-diameter-srcsuse-upgrade-erlang26-docsuse-upgrade-erlang26-epmdsuse-upgrade-erlang26-etsuse-upgrade-erlang26-et-srcsuse-upgrade-erlang26-jinterfacesuse-upgrade-erlang26-jinterface-srcsuse-upgrade-erlang26-observersuse-upgrade-erlang26-observer-srcsuse-upgrade-erlang26-reltoolsuse-upgrade-erlang26-reltool-srcsuse-upgrade-erlang26-srcsuse-upgrade-erlang26-wxsuse-upgrade-erlang26-wx-src
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.