Upstream information
CVE-2025-40914 at MITRE
Description
Perl CryptX before version 0.087 contains a dependency that may be susceptible to an integer overflow.
CryptX embeds a version of the libtommath library that is susceptible to an integer overflow associated with CVE-2023-36328.
Overall state of this security issue: Does not affect SUSE products
This issue is currently rated as having critical severity.
CVSS v3 Scores
| CVSS detail | CNA (CISA-ADP) |
| Base Score | 9.8 |
| Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
| Attack Vector | Network |
| Attack Complexity | Low |
| Privileges Required | None |
| User Interaction | None |
| Scope | Unchanged |
| Confidentiality Impact | High |
| Integrity Impact | High |
| Availability Impact | High |
| CVSSv3 Version | 3.1 |
SUSE Bugzilla entry:
1244472 [NEW]
No SUSE Security Announcements cross referenced.
List of released packages
| Product(s) | Fixed package version(s) | References |
| SUSE Package Hub 15 SP6 | openQA >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-auto-update >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-bootstrap >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-client >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-common >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-continuous-update >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-devel >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-doc >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-local-db >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-mcp >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-munin >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-python-scripts >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-single-instance >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-single-instance-nginx >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-worker >= 5.1757135418.ec726f9c-bp156.2.46.1
os-autoinst >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-devel >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-ipmi-deps >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-openvswitch >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-qemu-kvm >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-qemu-x86 >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-s390-deps >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-swtpm >= 5.1757071172.ffc94dc-bp156.2.39.1
perl-CryptX >= 0.87.0-bp156.3.6.1
perl-IPC-Run >= 20231003.0.0-bp156.3.3.1
perl-JSON-Validator >= 5.150.0-bp156.2.3.1
perl-MCP >= 0.40.0-bp156.2.1
perl-Mojolicious >= 9.410.0-bp156.2.6.1
| Patchnames: openSUSE-2025-340 openSUSE-2025-346 |
| openSUSE Leap 15.6 | openQA >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-auto-update >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-bootstrap >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-client >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-common >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-continuous-update >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-devel >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-doc >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-local-db >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-mcp >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-munin >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-python-scripts >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-single-instance >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-single-instance-nginx >= 5.1757135418.ec726f9c-bp156.2.46.1
openQA-worker >= 5.1757135418.ec726f9c-bp156.2.46.1
os-autoinst >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-devel >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-ipmi-deps >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-openvswitch >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-qemu-kvm >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-qemu-x86 >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-s390-deps >= 5.1757071172.ffc94dc-bp156.2.39.1
os-autoinst-swtpm >= 5.1757071172.ffc94dc-bp156.2.39.1
perl-CryptX >= 0.87.0-bp156.3.6.1
perl-IPC-Run >= 20231003.0.0-bp156.3.3.1
perl-JSON-Validator >= 5.150.0-bp156.2.3.1
perl-MCP >= 0.40.0-bp156.2.1
perl-Mojolicious >= 9.410.0-bp156.2.6.1
| Patchnames: openSUSE-2025-340 openSUSE-2025-346 |
| openSUSE Tumbleweed | perl-CryptX >= 0.87.0-1.1
| Patchnames: openSUSE-Tumbleweed-2025-15259 |
Status of this issue by product and package
Please note that this evaluation state might be work in progress, incomplete or outdated. Also information for service packs in the LTSS phase is only included for issues meeting the LTSS criteria. If in doubt, feel free to contact us for clarification. The updates are grouped by state of their lifecycle. SUSE product lifecycles are documented on the lifecycle page.
| Product(s) | Source package | State |
| Products under general support and receiving all security fixes. |
| SUSE Package Hub 15 SP6 | openQA | Released |
| SUSE Package Hub 15 SP6 | openQA-client-test | Released |
| SUSE Package Hub 15 SP6 | openQA-devel-test | Released |
| SUSE Package Hub 15 SP6 | openQA-test | Released |
| SUSE Package Hub 15 SP6 | openQA-worker-test | Released |
| SUSE Package Hub 15 SP6 | os-autoinst | Released |
| SUSE Package Hub 15 SP6 | os-autoinst-devel-test | Released |
| SUSE Package Hub 15 SP6 | os-autoinst-openvswitch-test | Released |
| SUSE Package Hub 15 SP6 | os-autoinst-test | Released |
| SUSE Package Hub 15 SP6 | perl-CryptX | Released |
| SUSE Package Hub 15 SP6 | perl-IPC-Run | Released |
| SUSE Package Hub 15 SP6 | perl-JSON-Validator | Released |
| SUSE Package Hub 15 SP6 | perl-MCP | Released |
| SUSE Package Hub 15 SP6 | perl-Mojolicious | Released |
SUSE Timeline for this CVE
CVE page created: Wed Jun 11 18:00:30 2025
CVE page last modified: Thu Dec 11 18:11:46 2025