Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-33430 (GCVE-0-2021-33430)
Vulnerability from cvelistv5 – Published: 2021-12-17 18:36 – Updated: 2024-08-03 23:50 Disputed- n/a
| URL | Tags |
|---|---|
| https://github.com/numpy/numpy/issues/18939 | x_refsource_MISC |
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-33430",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-05-01T14:32:49.100885Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-06-04T17:13:00.306Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-03T23:50:42.972Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://github.com/numpy/numpy/issues/18939"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user"
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-02-07T18:47:55.000Z",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/numpy/numpy/issues/18939"
}
],
"tags": [
"disputed"
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33430",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/numpy/numpy/issues/18939",
"refsource": "MISC",
"url": "https://github.com/numpy/numpy/issues/18939"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2021-33430",
"datePublished": "2021-12-17T18:36:51.000Z",
"dateReserved": "2021-05-20T00:00:00.000Z",
"dateUpdated": "2024-08-03T23:50:42.972Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2021-33430",
"date": "2026-05-20",
"epss": "0.00173",
"percentile": "0.38306"
},
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"1.9.0\", \"versionEndIncluding\": \"1.9.3\", \"matchCriteriaId\": \"850F12C4-29D8-4406-B851-8EA669B3F80E\"}]}]}]",
"cveTags": "[{\"sourceIdentifier\": \"cve@mitre.org\", \"tags\": [\"disputed\"]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user\"}, {\"lang\": \"es\", \"value\": \"** EN DISPUTA ** Se presenta una vulnerabilidad de desbordamiento del b\\u00fafer en NumPy versi\\u00f3n 1.9.x en la funci\\u00f3n PyArray_NewFromDescr_int del archivo ctors.c cuando son especificados arrays de grandes dimensiones (m\\u00e1s de 32) desde el c\\u00f3digo de Python, lo que podr\\u00eda permitir a un usuario malicioso causar una Denegaci\\u00f3n de Servicio. NOTA: El proveedor no est\\u00e1 de acuerdo en que esto sea una vulnerabilidad; en circunstancias (muy limitadas) un usuario puede ser capaz de provocar el desbordamiento del b\\u00fafer, lo m\\u00e1s probable es que el usuario ya tenga privilegios para al menos provocar la denegaci\\u00f3n de servicio agotando la memoria. Desencadenar esto requiere adem\\u00e1s el uso de una API poco com\\u00fan (dtypes estructurados complicados), que es muy poco probable que est\\u00e9 disponible para un usuario sin privilegios\"}]",
"id": "CVE-2021-33430",
"lastModified": "2024-11-21T06:08:48.743",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 1.6, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:S/C:N/I:N/A:P\", \"baseScore\": 3.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"SINGLE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"LOW\", \"exploitabilityScore\": 6.8, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2021-12-17T19:15:07.500",
"references": "[{\"url\": \"https://github.com/numpy/numpy/issues/18939\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://github.com/numpy/numpy/issues/18939\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-120\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2021-33430\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2021-12-17T19:15:07.500\",\"lastModified\":\"2024-11-21T06:08:48.743\",\"vulnStatus\":\"Modified\",\"cveTags\":[{\"sourceIdentifier\":\"cve@mitre.org\",\"tags\":[\"disputed\"]}],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user\"},{\"lang\":\"es\",\"value\":\"** EN DISPUTA ** Se presenta una vulnerabilidad de desbordamiento del b\u00fafer en NumPy versi\u00f3n 1.9.x en la funci\u00f3n PyArray_NewFromDescr_int del archivo ctors.c cuando son especificados arrays de grandes dimensiones (m\u00e1s de 32) desde el c\u00f3digo de Python, lo que podr\u00eda permitir a un usuario malicioso causar una Denegaci\u00f3n de Servicio. NOTA: El proveedor no est\u00e1 de acuerdo en que esto sea una vulnerabilidad; en circunstancias (muy limitadas) un usuario puede ser capaz de provocar el desbordamiento del b\u00fafer, lo m\u00e1s probable es que el usuario ya tenga privilegios para al menos provocar la denegaci\u00f3n de servicio agotando la memoria. Desencadenar esto requiere adem\u00e1s el uso de una API poco com\u00fan (dtypes estructurados complicados), que es muy poco probable que est\u00e9 disponible para un usuario sin privilegios\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.6,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:S/C:N/I:N/A:P\",\"baseScore\":3.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":6.8,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"1.9.0\",\"versionEndIncluding\":\"1.9.3\",\"matchCriteriaId\":\"850F12C4-29D8-4406-B851-8EA669B3F80E\"}]}]}],\"references\":[{\"url\":\"https://github.com/numpy/numpy/issues/18939\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://github.com/numpy/numpy/issues/18939\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/numpy/numpy/issues/18939\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T23:50:42.972Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-33430\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-05-01T14:32:49.100885Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-01T14:40:06.268Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"tags\": [\"disputed\"], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"n/a\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"references\": [{\"url\": \"https://github.com/numpy/numpy/issues/18939\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"n/a\"}]}], \"providerMetadata\": {\"orgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"shortName\": \"mitre\", \"dateUpdated\": \"2022-02-07T18:47:55.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"n/a\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://github.com/numpy/numpy/issues/18939\", \"name\": \"https://github.com/numpy/numpy/issues/18939\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"n/a\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-33430\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"cve@mitre.org\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-33430\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-03T23:50:42.972Z\", \"dateReserved\": \"2021-05-20T00:00:00.000Z\", \"assignerOrgId\": \"8254265b-2729-46b6-b9e3-3dfca2d5bfca\", \"datePublished\": \"2021-12-17T18:36:51.000Z\", \"assignerShortName\": \"mitre\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
CERTFR-2025-AVI-0585
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu pour Valkey versions ant\u00e9rieures \u00e0 8.1.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": " Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 6.30.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2022-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2817"
},
{
"name": "CVE-2022-2182",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2182"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2023-4504",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4504"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2024-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7531"
},
{
"name": "CVE-2021-25317",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25317"
},
{
"name": "CVE-2021-3968",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3968"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2022-2344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2344"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2022-3016",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3016"
},
{
"name": "CVE-2023-7216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7216"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2021-31535",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31535"
},
{
"name": "CVE-2022-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2285"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2022-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2982"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2022-2287",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2287"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2946"
},
{
"name": "CVE-2022-2862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2862"
},
{
"name": "CVE-2022-2889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2889"
},
{
"name": "CVE-2021-4173",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4173"
},
{
"name": "CVE-2020-12413",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12413"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2023-0051",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0051"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2023-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4781"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2022-3324",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3324"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-2257",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2257"
},
{
"name": "CVE-2024-45306",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45306"
},
{
"name": "CVE-2023-4751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4751"
},
{
"name": "CVE-2021-4136",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4136"
},
{
"name": "CVE-2023-4738",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4738"
},
{
"name": "CVE-2021-3928",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3928"
},
{
"name": "CVE-2015-1197",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1197"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2022-2042",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2042"
},
{
"name": "CVE-2022-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2183"
},
{
"name": "CVE-2024-29040",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29040"
},
{
"name": "CVE-2017-1000383",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000383"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2022-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2304"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2022-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2819"
},
{
"name": "CVE-2022-3705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3705"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2022-3234",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3234"
},
{
"name": "CVE-2022-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2126"
},
{
"name": "CVE-2021-3973",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3973"
},
{
"name": "CVE-2021-4166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4166"
},
{
"name": "CVE-2022-3256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3256"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2022-2343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2343"
},
{
"name": "CVE-2022-2849",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2849"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-3235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3235"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2022-3134",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3134"
},
{
"name": "CVE-2023-0512",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0512"
},
{
"name": "CVE-2022-2175",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2175"
},
{
"name": "CVE-2022-3297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3297"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-1616",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1616"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-2284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2284"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2022-2286",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2286"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2022-3352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3352"
},
{
"name": "CVE-2023-0054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0054"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2022-3296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3296"
},
{
"name": "CVE-2021-45261",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45261"
},
{
"name": "CVE-2022-42889",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42889"
},
{
"name": "CVE-2023-0433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0433"
},
{
"name": "CVE-2022-2345",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2345"
},
{
"name": "CVE-2021-3974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3974"
},
{
"name": "CVE-2022-2845",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2845"
},
{
"name": "CVE-2022-2210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2210"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2023-4735",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4735"
},
{
"name": "CVE-2023-4734",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4734"
},
{
"name": "CVE-2023-2610",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2610"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2022-1620",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1620"
},
{
"name": "CVE-2023-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5535"
},
{
"name": "CVE-2022-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1720"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2022-4292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4292"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2022-2522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2522"
},
{
"name": "CVE-2022-2129",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2129"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-27151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27151"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2023-0288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0288"
},
{
"name": "CVE-2025-52968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52968"
},
{
"name": "CVE-2022-3037",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3037"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-2206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2206"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2022-2124",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2124"
},
{
"name": "CVE-2023-7207",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7207"
},
{
"name": "CVE-2022-1619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1619"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2022-4141",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4141"
},
{
"name": "CVE-2022-3099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3099"
},
{
"name": "CVE-2021-4187",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4187"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2021-3927",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3927"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2023-0049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0049"
},
{
"name": "CVE-2023-5344",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5344"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2022-2125",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2125"
},
{
"name": "CVE-2022-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2207"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-1127",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1127"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0585",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35935",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35935"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35934",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35934"
},
{
"published_at": "2025-07-10",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35931",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35931"
}
]
}
CNVD-2021-101679
Vulnerability from cnvd - Published: 2021-12-23目前厂商已发布升级补丁以修复漏洞,补丁获取链接: https://github.com/numpy/numpy/pull/18989
| Name | NumPy NumPy >=1.9.0,<=1.9.3 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-33430"
}
},
"description": "NumPy\u662f\u4e00\u4e2aPython\u79d1\u5b66\u8ba1\u7b97\u5305\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u5927\u91cf\u7684\u7ef4\u5ea6\u6570\u7ec4\u4e0e\u77e9\u9635\u8ba1\u7b97\uff0c\u540c\u65f6\u9488\u5bf9\u6570\u636e\u8fd0\u7b97\u63d0\u4f9b\u5927\u91cf\u7684\u6570\u5b66\u51fd\u6570\u5e93\u3002\n\nNumPy 1.9\u7248\u672c\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728ctor .c\u7684 PyArray_NewFromDescr_int\u51fd\u6570\u4e2d\u7f3a\u5c11\u5bf9\u4e8e\u6570\u7ec4\u957f\u5ea6\u7684\u9650\u5236\uff0c\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002",
"formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u53d1\u5e03\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6f0f\u6d1e\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/numpy/numpy/pull/18989",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-101679",
"openTime": "2021-12-23",
"patchDescription": "NumPy\u662f\u4e00\u4e2aPython\u79d1\u5b66\u8ba1\u7b97\u5305\u3002\u8be5\u4ea7\u54c1\u652f\u6301\u5927\u91cf\u7684\u7ef4\u5ea6\u6570\u7ec4\u4e0e\u77e9\u9635\u8ba1\u7b97\uff0c\u540c\u65f6\u9488\u5bf9\u6570\u636e\u8fd0\u7b97\u63d0\u4f9b\u5927\u91cf\u7684\u6570\u5b66\u51fd\u6570\u5e93\u3002\r\n\r\nNumPy 1.9\u7248\u672c\u5b58\u5728\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u6e90\u4e8e\u5728ctor .c\u7684 PyArray_NewFromDescr_int\u51fd\u6570\u4e2d\u7f3a\u5c11\u5bf9\u4e8e\u6570\u7ec4\u957f\u5ea6\u7684\u9650\u5236\uff0c\u5bfc\u81f4\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "NumPy\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "NumPy NumPy \u003e=1.9.0\uff0c\u003c=1.9.3"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-33430",
"serverity": "\u4e2d",
"submitTime": "2021-12-21",
"title": "NumPy\u7f13\u51b2\u533a\u6ea2\u51fa\u6f0f\u6d1e"
}
FKIE_CVE-2021-33430
Vulnerability from fkie_nvd - Published: 2021-12-17 19:15 - Updated: 2024-11-21 06:08| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | https://github.com/numpy/numpy/issues/18939 | Exploit, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/numpy/numpy/issues/18939 | Exploit, Third Party Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850F12C4-29D8-4406-B851-8EA669B3F80E",
"versionEndIncluding": "1.9.3",
"versionStartIncluding": "1.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [
{
"sourceIdentifier": "cve@mitre.org",
"tags": [
"disputed"
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user"
},
{
"lang": "es",
"value": "** EN DISPUTA ** Se presenta una vulnerabilidad de desbordamiento del b\u00fafer en NumPy versi\u00f3n 1.9.x en la funci\u00f3n PyArray_NewFromDescr_int del archivo ctors.c cuando son especificados arrays de grandes dimensiones (m\u00e1s de 32) desde el c\u00f3digo de Python, lo que podr\u00eda permitir a un usuario malicioso causar una Denegaci\u00f3n de Servicio. NOTA: El proveedor no est\u00e1 de acuerdo en que esto sea una vulnerabilidad; en circunstancias (muy limitadas) un usuario puede ser capaz de provocar el desbordamiento del b\u00fafer, lo m\u00e1s probable es que el usuario ya tenga privilegios para al menos provocar la denegaci\u00f3n de servicio agotando la memoria. Desencadenar esto requiere adem\u00e1s el uso de una API poco com\u00fan (dtypes estructurados complicados), que es muy poco probable que est\u00e9 disponible para un usuario sin privilegios"
}
],
"id": "CVE-2021-33430",
"lastModified": "2024-11-21T06:08:48.743",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-17T19:15:07.500",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18939"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18939"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
GHSA-6P56-WP2H-9HXR
Vulnerability from github – Published: 2022-01-07 00:09 – Updated: 2024-09-26 14:21A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.
NOTE: The vendor does not agree this is a vulnerability; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.
{
"affected": [
{
"package": {
"ecosystem": "PyPI",
"name": "numpy"
},
"ranges": [
{
"events": [
{
"introduced": "1.9.0"
},
{
"fixed": "1.21"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2021-33430"
],
"database_specific": {
"cwe_ids": [
"CWE-120"
],
"github_reviewed": true,
"github_reviewed_at": "2022-01-04T20:52:47Z",
"nvd_published_at": "2021-12-17T19:15:00Z",
"severity": "MODERATE"
},
"details": "A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.\n\nNOTE: The vendor does not agree this is a vulnerability; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.",
"id": "GHSA-6p56-wp2h-9hxr",
"modified": "2024-09-26T14:21:10Z",
"published": "2022-01-07T00:09:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-33430"
},
{
"type": "WEB",
"url": "https://github.com/numpy/numpy/issues/18939"
},
{
"type": "WEB",
"url": "https://github.com/numpy/numpy/commit/ae317fd9ff3e79c0eac357d723bfc29cbd625f2e"
},
{
"type": "PACKAGE",
"url": "https://github.com/numpy/numpy"
},
{
"type": "WEB",
"url": "https://github.com/pypa/advisory-database/tree/main/vulns/numpy/PYSEC-2021-854.yaml"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "NumPy Buffer Overflow (Disputed)"
}
GSD-2021-33430
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-33430",
"description": "A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service.",
"id": "GSD-2021-33430",
"references": [
"https://www.suse.com/security/cve/CVE-2021-33430.html",
"https://advisories.mageia.org/CVE-2021-33430.html",
"https://access.redhat.com/errata/RHSA-2022:0987",
"https://access.redhat.com/errata/RHSA-2022:1000",
"https://ubuntu.com/security/CVE-2021-33430"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-33430"
],
"details": "** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.",
"id": "GSD-2021-33430",
"modified": "2023-12-13T01:23:18.856246Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2021-33430",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/numpy/numpy/issues/18939",
"refsource": "MISC",
"url": "https://github.com/numpy/numpy/issues/18939"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003e=1.9.0,\u003c=1.9.3",
"affected_versions": "All versions starting from 1.9.0 up to 1.9.3",
"cvss_v2": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-120",
"CWE-937"
],
"date": "2021-12-22",
"description": "A Buffer Overflow vulnerability exists in NumPy in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over ) from Python code, which could let a malicious user cause a Denial of Service.",
"fixed_versions": [
"1.10.0"
],
"identifier": "CVE-2021-33430",
"identifiers": [
"CVE-2021-33430"
],
"not_impacted": "All versions before 1.9.0, all versions after 1.9.3",
"package_slug": "pypi/numpy",
"pubdate": "2021-12-17",
"solution": "Upgrade to version 1.10.0 or above.",
"title": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2021-33430",
"https://github.com/numpy/numpy/issues/18939"
],
"uuid": "a6410a74-9ae9-421f-917c-901f424810dc"
}
]
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:numpy:numpy:*:*:*:*:*:*:*:*",
"matchCriteriaId": "850F12C4-29D8-4406-B851-8EA669B3F80E",
"versionEndIncluding": "1.9.3",
"versionStartIncluding": "1.9.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user"
},
{
"lang": "es",
"value": "** EN DISPUTA ** Se presenta una vulnerabilidad de desbordamiento del b\u00fafer en NumPy versi\u00f3n 1.9.x en la funci\u00f3n PyArray_NewFromDescr_int del archivo ctors.c cuando son especificados arrays de grandes dimensiones (m\u00e1s de 32) desde el c\u00f3digo de Python, lo que podr\u00eda permitir a un usuario malicioso causar una Denegaci\u00f3n de Servicio. NOTA: El proveedor no est\u00e1 de acuerdo en que esto sea una vulnerabilidad; en circunstancias (muy limitadas) un usuario puede ser capaz de provocar el desbordamiento del b\u00fafer, lo m\u00e1s probable es que el usuario ya tenga privilegios para al menos provocar la denegaci\u00f3n de servicio agotando la memoria. Desencadenar esto requiere adem\u00e1s el uso de una API poco com\u00fan (dtypes estructurados complicados), que es muy poco probable que est\u00e9 disponible para un usuario sin privilegios"
}
],
"id": "CVE-2021-33430",
"lastModified": "2024-04-11T01:11:51.687",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "SINGLE",
"availabilityImpact": "PARTIAL",
"baseScore": 3.5,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.6,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-12-17T19:15:07.500",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Third Party Advisory"
],
"url": "https://github.com/numpy/numpy/issues/18939"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-120"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
}
}
}
OPENSUSE-SU-2022:0134-1
Vulnerability from csaf_opensuse - Published: 2022-10-17 11:25 - Updated: 2022-10-17 11:25| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python-numpy",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python-numpy fixes the following issues:\n\n- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).\n- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2022-134,openSUSE-SLE-15.3-2022-134",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_0134-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:0134-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQS3J3J4254A7C3LD55D7A432FZ2RFFI/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:0134-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/LQS3J3J4254A7C3LD55D7A432FZ2RFFI/"
},
{
"category": "self",
"summary": "SUSE Bug 1193907",
"url": "https://bugzilla.suse.com/1193907"
},
{
"category": "self",
"summary": "SUSE Bug 1193913",
"url": "https://bugzilla.suse.com/1193913"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33430 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33430/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41496 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41496/"
}
],
"title": "Security update for python-numpy",
"tracking": {
"current_release_date": "2022-10-17T11:25:14Z",
"generator": {
"date": "2022-10-17T11:25:14Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:0134-1",
"initial_release_date": "2022-10-17T11:25:14Z",
"revision_history": [
{
"date": "2022-10-17T11:25:14Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"product": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"product_id": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"product": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"product_id": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy-1.17.3-10.1.aarch64",
"product_id": "python3-numpy-1.17.3-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy-devel-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy-devel-1.17.3-10.1.aarch64",
"product_id": "python3-numpy-devel-1.17.3-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"product_id": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"product_id": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"product_id": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"product_id": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "dxflib-devel-3.17.0-bp153.2.3.1.i586",
"product": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.i586",
"product_id": "dxflib-devel-3.17.0-bp153.2.3.1.i586"
}
},
{
"category": "product_version",
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"product": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"product_id": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"product": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"product_id": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"product": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"product_id": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy-1.17.3-10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy-devel-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy-devel-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy-devel-1.17.3-10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"product_id": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"product": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"product_id": "dxflib-devel-3.17.0-bp153.2.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"product": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"product_id": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy-1.17.3-10.1.s390x",
"product_id": "python3-numpy-1.17.3-10.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy-devel-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy-devel-1.17.3-10.1.s390x",
"product_id": "python3-numpy-devel-1.17.3-10.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"product_id": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"product_id": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"product_id": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"product_id": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"product": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"product_id": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"product": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"product_id": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy-1.17.3-10.1.x86_64",
"product_id": "python3-numpy-1.17.3-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy-devel-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy-devel-1.17.3-10.1.x86_64",
"product_id": "python3-numpy-devel-1.17.3-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"product_id": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"product_id": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"product_id": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64"
}
},
{
"category": "product_version",
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64",
"product": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64",
"product_id": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP3",
"product": {
"name": "SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 as component of SUSE Package Hub 15 SP3",
"product_id": "SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64"
},
"product_reference": "libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
},
"product_reference": "python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33430",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33430"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33430",
"url": "https://www.suse.com/security/cve/CVE-2021-33430"
},
{
"category": "external",
"summary": "SUSE Bug 1193913 for CVE-2021-33430",
"url": "https://bugzilla.suse.com/1193913"
},
{
"category": "external",
"summary": "SUSE Bug 1201968 for CVE-2021-33430",
"url": "https://bugzilla.suse.com/1201968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:25:14Z",
"details": "important"
}
],
"title": "CVE-2021-33430"
},
{
"cve": "CVE-2021-41496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41496"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy \u003c 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41496",
"url": "https://www.suse.com/security/cve/CVE-2021-41496"
},
{
"category": "external",
"summary": "SUSE Bug 1193907 for CVE-2021-41496",
"url": "https://bugzilla.suse.com/1193907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"SUSE Package Hub 15 SP3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:dxflib-devel-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.aarch64",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.i586",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.ppc64le",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.s390x",
"openSUSE Leap 15.3:libdxflib-3_17_0-1-3.17.0-bp153.2.3.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy-gnu-hpc-devel-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-1.17.3-10.1.x86_64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.aarch64",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.ppc64le",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.s390x",
"openSUSE Leap 15.3:python3-numpy_1_17_3-gnu-hpc-devel-1.17.3-10.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-10-17T11:25:14Z",
"details": "moderate"
}
],
"title": "CVE-2021-41496"
}
]
}
OPENSUSE-SU-2022:1064-1
Vulnerability from csaf_opensuse - Published: 2022-09-12 11:08 - Updated: 2022-09-12 11:08| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
| Product | Identifier | Version | Remediation |
|---|---|---|---|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le | — |
Vendor Fix
|
|
| Unresolved product id: openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 | — |
Vendor Fix
|
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for python2-numpy",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for python2-numpy fixes the following issues:\n\n- CVE-2021-33430: Fixed buffer overflow that could lead to DoS in PyArray_NewFromDescr_int function of ctors.c (bsc#1193913).\n- CVE-2021-41496: Fixed buffer overflow that could lead to DoS in array_from_pyobj function of fortranobject.c (bsc#1193907).\n- CVE-2021-41495: Fixed Null Pointer Dereference in numpy.sort due to missing return value validation (bsc#1193911).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-SLE-15.3-2022-1064",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2022_1064-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2022:1064-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2022:1064-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IVU5XH7TX2TXVVZCKS7DIEBNEJKYZTSK/"
},
{
"category": "self",
"summary": "SUSE Bug 1193907",
"url": "https://bugzilla.suse.com/1193907"
},
{
"category": "self",
"summary": "SUSE Bug 1193911",
"url": "https://bugzilla.suse.com/1193911"
},
{
"category": "self",
"summary": "SUSE Bug 1193913",
"url": "https://bugzilla.suse.com/1193913"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-33430 page",
"url": "https://www.suse.com/security/cve/CVE-2021-33430/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41495 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-41496 page",
"url": "https://www.suse.com/security/cve/CVE-2021-41496/"
}
],
"title": "Security update for python2-numpy",
"tracking": {
"current_release_date": "2022-09-12T11:08:44Z",
"generator": {
"date": "2022-09-12T11:08:44Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2022:1064-1",
"initial_release_date": "2022-09-12T11:08:44Z",
"revision_history": [
{
"date": "2022-09-12T11:08:44Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python2-numpy-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy-1.16.5-150200.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy-devel-1.16.5-150200.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"product_id": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy-1.16.5-150200.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"product_id": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-numpy-1.16.5-150200.3.5.1.s390x",
"product": {
"name": "python2-numpy-1.16.5-150200.3.5.1.s390x",
"product_id": "python2-numpy-1.16.5-150200.3.5.1.s390x"
}
},
{
"category": "product_version",
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"product": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"product_id": "python2-numpy-devel-1.16.5-150200.3.5.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python2-numpy-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy-1.16.5-150200.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy-devel-1.16.5-150200.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64"
}
},
{
"category": "product_version",
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"product": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"product_id": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 15.3",
"product": {
"name": "openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.3"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-1.16.5-150200.3.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x"
},
"product_reference": "python2-numpy-1.16.5-150200.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.s390x as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x"
},
"product_reference": "python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-devel-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64 as component of openSUSE Leap 15.3",
"product_id": "openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
},
"product_reference": "python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.3"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-33430",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-33430"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** A Buffer Overflow vulnerability exists in NumPy 1.9.x in the PyArray_NewFromDescr_int function of ctors.c when specifying arrays of large dimensions (over 32) from Python code, which could let a malicious user cause a Denial of Service. NOTE: The vendor does not agree this is a vulneraility; In (very limited) circumstances a user may be able provoke the buffer overflow, the user is most likely already privileged to at least provoke denial of service by exhausting memory. Triggering this further requires the use of uncommon API (complicated structured dtypes), which is very unlikely to be available to an unprivileged user.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-33430",
"url": "https://www.suse.com/security/cve/CVE-2021-33430"
},
{
"category": "external",
"summary": "SUSE Bug 1193913 for CVE-2021-33430",
"url": "https://bugzilla.suse.com/1193913"
},
{
"category": "external",
"summary": "SUSE Bug 1201968 for CVE-2021-33430",
"url": "https://bugzilla.suse.com/1201968"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T11:08:44Z",
"details": "important"
}
],
"title": "CVE-2021-33430"
},
{
"cve": "CVE-2021-41495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41495"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** Null Pointer Dereference vulnerability exists in numpy.sort in NumPy \u0026lt and 1.19 in the PyArray_DescrNew function due to missing return-value validation, which allows attackers to conduct DoS attacks by repetitively creating sort arrays. NOTE: While correct that validation is missing, an error can only occur due to an exhaustion of memory. If the user can exhaust memory, they are already privileged. Further, it should be practically impossible to construct an attack which can target the memory exhaustion to occur at exactly this place.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41495",
"url": "https://www.suse.com/security/cve/CVE-2021-41495"
},
{
"category": "external",
"summary": "SUSE Bug 1193911 for CVE-2021-41495",
"url": "https://bugzilla.suse.com/1193911"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T11:08:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-41495"
},
{
"cve": "CVE-2021-41496",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-41496"
}
],
"notes": [
{
"category": "general",
"text": "** DISPUTED ** Buffer overflow in the array_from_pyobj function of fortranobject.c in NumPy \u003c 1.19, which allows attackers to conduct a Denial of Service attacks by carefully constructing an array with negative values. NOTE: The vendor does not agree this is a vulnerability; the negative dimensions can only be created by an already privileged user (or internally).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-41496",
"url": "https://www.suse.com/security/cve/CVE-2021-41496"
},
{
"category": "external",
"summary": "SUSE Bug 1193907 for CVE-2021-41496",
"url": "https://bugzilla.suse.com/1193907"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.s390x",
"openSUSE Leap 15.3:python2-numpy-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-1.16.5-150200.3.5.1.x86_64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.aarch64",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.ppc64le",
"openSUSE Leap 15.3:python2-numpy_1_16_5-gnu-hpc-devel-1.16.5-150200.3.5.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2022-09-12T11:08:44Z",
"details": "moderate"
}
],
"title": "CVE-2021-41496"
}
]
}
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.