<?xml version="1.0" encoding="UTF-8"?>
<cvrfdoc xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cpe="http://cpe.mitre.org/language/2.0" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvssv2="http://scap.nist.gov/schema/cvss-v2/1.0" xmlns:cvssv3="https://www.first.org/cvss/cvss-v3.0.xsd" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:ns0="http://purl.org/dc/elements/1.1/" xmlns:prod="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod" xmlns:scap-core="http://scap.nist.gov/schema/scap-core/1.0" xmlns:sch="http://purl.oclc.org/dsdl/schematron" xmlns:vuln="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
  <DocumentTitle xml:lang="en">CVE-2025-29922</DocumentTitle>
  <DocumentType>SUSE CVE</DocumentType>
  <DocumentPublisher Type="Vendor">
    <ContactDetails>security@suse.de</ContactDetails>
    <IssuingAuthority>SUSE Security Team</IssuingAuthority>
  </DocumentPublisher>
  <DocumentTracking>
    <Identification>
      <ID>SUSE CVE-2025-29922</ID>
    </Identification>
    <Status>Interim</Status>
    <Version>1</Version>
    <RevisionHistory>
      <Revision>
        <Number>4</Number>
        <Date>2026-03-05T01:10:26Z</Date>
        <Description>current</Description>
      </Revision>
    </RevisionHistory>
    <InitialReleaseDate>2025-03-30T00:11:55Z</InitialReleaseDate>
    <CurrentReleaseDate>2026-03-05T01:10:26Z</CurrentReleaseDate>
    <Generator>
      <Engine>cve-database/bin/generate-cvrf-cve.pl</Engine>
      <Date>2020-12-27T01:00:00Z</Date>
    </Generator>
  </DocumentTracking>
  <DocumentNotes>
    <Note Title="CVE" Type="Summary" Ordinal="1" xml:lang="en">CVE-2025-29922</Note>
    <Note Title="Mitre CVE Description" Type="Description" Ordinal="2" xml:lang="en">kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.26.3, the identified vulnerability allows creating or deleting an object via the APIExport VirtualWorkspace in any arbitrary target workspace for pre-existing resources. By design, this should only be allowed when the workspace owner decides to give access to an API provider by creating an APIBinding. With this vulnerability, it is possible for an attacker to create and delete objects even if none of these requirements are satisfied, i.e. even if there is no APIBinding in that workspace at all or the workspace owner has created an APIBinding, but rejected a permission claim. A fix for this issue has been identified and has been published with kcp 0.26.3 and 0.27.0.</Note>
    <Note Title="Terms of Use" Type="Legal Disclaimer" Ordinal="4" xml:lang="en">The CVRF data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).</Note>
  </DocumentNotes>
  <DocumentReferences>
    <Reference Type="Self">
      <URL>https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/NEVFAGUWHTVZSJTUAIU6C4S26DP2KIGB/</URL>
      <Description>E-Mail link for openSUSE-SU-2025:14937-1</Description>
    </Reference>
    <Reference Type="Self">
      <URL>https://www.suse.com/support/security/rating/</URL>
      <Description>SUSE Security Ratings</Description>
    </Reference>
  </DocumentReferences>
  <ProductTree xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/prod">
    <Branch Type="Product Family" Name="Image SLE-Micro">
      <Branch Type="Product Name" Name="Image SLE-Micro">
        <FullProductName ProductID="Image SLE-Micro">Image SLE-Micro</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLE-Micro-Azure">
      <Branch Type="Product Name" Name="Image SLE-Micro-Azure">
        <FullProductName ProductID="Image SLE-Micro-Azure">Image SLE-Micro-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLE-Micro-BYOS">
      <Branch Type="Product Name" Name="Image SLE-Micro-BYOS">
        <FullProductName ProductID="Image SLE-Micro-BYOS">Image SLE-Micro-BYOS</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLE-Micro-BYOS-Azure">
      <Branch Type="Product Name" Name="Image SLE-Micro-BYOS-Azure">
        <FullProductName ProductID="Image SLE-Micro-BYOS-Azure">Image SLE-Micro-BYOS-Azure</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLE-Micro-BYOS-EC2">
      <Branch Type="Product Name" Name="Image SLE-Micro-BYOS-EC2">
        <FullProductName ProductID="Image SLE-Micro-BYOS-EC2">Image SLE-Micro-BYOS-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="Image SLE-Micro-EC2">
      <Branch Type="Product Name" Name="Image SLE-Micro-EC2">
        <FullProductName ProductID="Image SLE-Micro-EC2">Image SLE-Micro-EC2</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="SUSE Linux Enterprise Server 16.0">
      <Branch Type="Product Name" Name="SUSE Linux Enterprise Server 16.0">
        <FullProductName ProductID="SUSE Linux Enterprise Server 16.0" CPE="cpe:/o:suse:sles:16:16.0:server">SUSE Linux Enterprise Server 16.0</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Family" Name="openSUSE Tumbleweed">
      <Branch Type="Product Name" Name="openSUSE Tumbleweed">
        <FullProductName ProductID="openSUSE Tumbleweed" CPE="cpe:/o:opensuse:tumbleweed">openSUSE Tumbleweed</FullProductName>
      </Branch>
    </Branch>
    <Branch Type="Product Version" Name="cloud-init-25.1.3-slfo.1.1_1.1">
      <FullProductName ProductID="cloud-init-25.1.3-slfo.1.1_1.1" CPE="cpe:2.3:a:canonical:cloud-init:25.1.3:*:*:*:*:*:*:*">cloud-init-25.1.3-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="cloud-init-config-suse-25.1.3-slfo.1.1_1.1">
      <FullProductName ProductID="cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="govulncheck-vulndb-0.0.20250327T184518-1.1">
      <FullProductName ProductID="govulncheck-vulndb-0.0.20250327T184518-1.1">govulncheck-vulndb-0.0.20250327T184518-1.1</FullProductName>
    </Branch>
    <Branch Type="Product Version" Name="govulncheck-vulndb-0.0.20250814T182633-160000.1.2">
      <FullProductName ProductID="govulncheck-vulndb-0.0.20250814T182633-160000.1.2">govulncheck-vulndb-0.0.20250814T182633-160000.1.2</FullProductName>
    </Branch>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro">
      <FullProductName ProductID="Image SLE-Micro:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro">
      <FullProductName ProductID="Image SLE-Micro:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-Azure">
      <FullProductName ProductID="Image SLE-Micro-Azure:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-Azure">
      <FullProductName ProductID="Image SLE-Micro-Azure:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS">
      <FullProductName ProductID="Image SLE-Micro-BYOS:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS">
      <FullProductName ProductID="Image SLE-Micro-BYOS:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS-Azure">
      <FullProductName ProductID="Image SLE-Micro-BYOS-Azure:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS-Azure">
      <FullProductName ProductID="Image SLE-Micro-BYOS-Azure:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS-Azure</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS-EC2">
      <FullProductName ProductID="Image SLE-Micro-BYOS-EC2:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-BYOS-EC2">
      <FullProductName ProductID="Image SLE-Micro-BYOS-EC2:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-BYOS-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-EC2">
      <FullProductName ProductID="Image SLE-Micro-EC2:cloud-init-25.1.3-slfo.1.1_1.1">cloud-init-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="cloud-init-config-suse-25.1.3-slfo.1.1_1.1" RelationType="Default Component Of" RelatesToProductReference="Image SLE-Micro-EC2">
      <FullProductName ProductID="Image SLE-Micro-EC2:cloud-init-config-suse-25.1.3-slfo.1.1_1.1">cloud-init-config-suse-25.1.3-slfo.1.1_1.1 as a component of Image SLE-Micro-EC2</FullProductName>
    </Relationship>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20250814T182633-160000.1.2" RelationType="Default Component Of" RelatesToProductReference="SUSE Linux Enterprise Server 16.0">
      <FullProductName ProductID="SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2">govulncheck-vulndb-0.0.20250814T182633-160000.1.2 as a component of SUSE Linux Enterprise Server 16.0</FullProductName>
    </Relationship>
    <Relationship ProductReference="govulncheck-vulndb-0.0.20250327T184518-1.1" RelationType="Default Component Of" RelatesToProductReference="openSUSE Tumbleweed">
      <FullProductName ProductID="openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250327T184518-1.1">govulncheck-vulndb-0.0.20250327T184518-1.1 as a component of openSUSE Tumbleweed</FullProductName>
    </Relationship>
  </ProductTree>
  <Vulnerability xmlns="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/vuln" Ordinal="1">
    <Notes>
      <Note Title="Vulnerability Description" Type="General" Ordinal="1" xml:lang="en">kcp is a Kubernetes-like control plane for form-factors and use-cases beyond Kubernetes and container workloads. Prior to 0.26.3, the identified vulnerability allows creating or deleting an object via the APIExport VirtualWorkspace in any arbitrary target workspace for pre-existing resources. By design, this should only be allowed when the workspace owner decides to give access to an API provider by creating an APIBinding. With this vulnerability, it is possible for an attacker to create and delete objects even if none of these requirements are satisfied, i.e. even if there is no APIBinding in that workspace at all or the workspace owner has created an APIBinding, but rejected a permission claim. A fix for this issue has been identified and has been published with kcp 0.26.3 and 0.27.0.</Note>
    </Notes>
    <CVE>CVE-2025-29922</CVE>
    <ProductStatuses>
      <Status Type="Fixed">
        <ProductID>Image SLE-Micro:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-Azure:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-Azure:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS-Azure:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS-Azure:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS-EC2:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-BYOS-EC2:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-EC2:cloud-init-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>Image SLE-Micro-EC2:cloud-init-config-suse-25.1.3-slfo.1.1_1.1</ProductID>
        <ProductID>SUSE Linux Enterprise Server 16.0:govulncheck-vulndb-0.0.20250814T182633-160000.1.2</ProductID>
        <ProductID>openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250327T184518-1.1</ProductID>
      </Status>
    </ProductStatuses>
    <Threats>
      <Threat Type="Impact">
        <Description>critical</Description>
      </Threat>
    </Threats>
  </Vulnerability>
</cvrfdoc>
