Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-3576 (GCVE-0-2023-3576)
Vulnerability from cvelistv5
- CWE-119 - Improper Restriction of Operations within the Bounds of a Memory Buffer
| Vendor | Product | Version | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Red Hat | Red Hat Enterprise Linux 9 |
Unaffected: 0:4.4.0-10.el9 < * cpe:/a:redhat:enterprise_linux:9::appstream cpe:/a:redhat:enterprise_linux:9::crb |
|||||||||||||||||||||||||||||||||||||
|
|||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T07:01:55.939Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "RHSA-2023:6575",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"name": "RHBZ#2219340",
"tags": [
"issue-tracking",
"x_refsource_REDHAT",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/a:redhat:enterprise_linux:9::appstream",
"cpe:/a:redhat:enterprise_linux:9::crb"
],
"defaultStatus": "affected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:4.4.0-10.el9",
"versionType": "rpm"
}
]
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:6"
],
"defaultStatus": "unknown",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 6",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unknown",
"packageName": "compat-libtiff3",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:7"
],
"defaultStatus": "unknown",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 7",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "compat-libtiff3",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "libtiff",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:8"
],
"defaultStatus": "affected",
"packageName": "mingw-libtiff",
"product": "Red Hat Enterprise Linux 8",
"vendor": "Red Hat"
},
{
"collectionURL": "https://access.redhat.com/downloads/content/package-browser/",
"cpes": [
"cpe:/o:redhat:enterprise_linux:9"
],
"defaultStatus": "affected",
"packageName": "compat-libtiff3",
"product": "Red Hat Enterprise Linux 9",
"vendor": "Red Hat"
}
],
"datePublic": "2023-03-07T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service."
}
],
"metrics": [
{
"other": {
"content": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"value": "Moderate"
},
"type": "Red Hat severity rating"
}
},
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"format": "CVSS"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-20T17:39:50.684Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"name": "RHSA-2023:6575",
"tags": [
"vendor-advisory",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"tags": [
"vdb-entry",
"x_refsource_REDHAT"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"name": "RHBZ#2219340",
"tags": [
"issue-tracking",
"x_refsource_REDHAT"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-03-09T00:00:00+00:00",
"value": "Reported to Red Hat."
},
{
"lang": "en",
"time": "2023-03-07T00:00:00+00:00",
"value": "Made public."
}
],
"title": "Libtiff: memory leak in tiffcrop.c",
"x_redhatCweChain": "CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-3576",
"datePublished": "2023-10-04T18:02:23.926Z",
"dateReserved": "2023-07-10T09:16:33.670Z",
"dateUpdated": "2025-11-20T17:39:50.684Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-3576\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-10-04T19:15:10.340\",\"lastModified\":\"2024-11-21T08:17:35.157\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.\"},{\"lang\":\"es\",\"value\":\"Se encontr\u00f3 una falla de p\u00e9rdida de memoria en la utilidad tiffcrop de Libatiff. Este problema se produce cuando tiffcrop opera en un archivo de imagen TIFF, lo que permite a un atacante pasar un archivo de imagen TIFF manipulado a la utilidad tiffcrop, lo que provoca este problema de p\u00e9rdida de memoria, un bloqueo de la aplicaci\u00f3n y, finalmente, una denegaci\u00f3n de servicio.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-401\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"4.5.1\",\"matchCriteriaId\":\"4133F7CE-3597-4F03-B3E4-3EA0BB5ADE64\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3FEADDA-2AEE-4F65-9401-971B585664A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CFF558-3C47-480D-A2F0-BABF26042943\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F6FB57C-2BC7-487C-96DD-132683AEB35D\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6575\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-3576\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2219340\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://access.redhat.com/errata/RHSA-2023:6575\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-3576\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2219340\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
rhsa-2023:6575
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: null pointer dereference in LZWDecode() in libtiff/tif_lzw.c (CVE-2023-2731)\n\n* libtiff: tiffcrop: null pointer dereference in TIFFClose() (CVE-2023-3316)\n\n* libtiff: memory leak in tiffcrop.c (CVE-2023-3576)\n\n* libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c (CVE-2023-26965)\n\n* libtiff: Buffer Overflow in uv_encode() (CVE-2023-26966)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6575",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index"
},
{
"category": "external",
"summary": "2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6575.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2025-11-21T18:49:19+00:00",
"generator": {
"date": "2025-11-21T18:49:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:6575",
"initial_release_date": "2023-11-07T08:13:41+00:00",
"revision_history": [
{
"date": "2023-11-07T08:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-07T08:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:49:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.src",
"product": {
"name": "libtiff-0:4.4.0-10.el9.src",
"product_id": "libtiff-0:4.4.0-10.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-0:4.4.0-10.el9.i686",
"product_id": "libtiff-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_id": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17095",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2017-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1524284"
}
],
"notes": [
{
"category": "description",
"text": "tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because it allows a remote attacker to trigger a denial of service through a heap-based buffer overflow, exploiting this flaw would crash the application, affecting availability without compromising system integrity.\n\nThis vulnerability affects the pal2rgb executable which is part of the tools distributed with libtiff upstream, but shipped in libtiff-tools RPM package instead of libtiff package on Red Hat Enterprise Linux distribution.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17095"
},
{
"category": "external",
"summary": "RHBZ#1524284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17095"
}
],
"release_date": "2017-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service"
},
{
"cve": "CVE-2023-2731",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2207635"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in Libtiff\u0027s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2731"
},
{
"category": "external",
"summary": "RHBZ#2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731"
}
],
"release_date": "2023-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c"
},
{
"cve": "CVE-2023-3316",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216080"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in LibTiff. A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: tiffcrop: null pointer dereference in TIFFClose()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "RHBZ#2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316"
}
],
"release_date": "2023-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: tiffcrop: null pointer dereference in TIFFClose()"
},
{
"cve": "CVE-2023-3576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219340"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: memory leak in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations provide a strong foundation for maintaining a secure and resilient environment. Rigorous testing and development practices (SAST, DAST, etc.) identify and address memory vulnerabilities before they are promoted to Red Hat production platforms, and the malicious code protection used further mitigates impacts by detecting, blocking, and responding to exploitation attempts. The platform uses OS versions that inherit certain security tools and features from RHEL that are enabled by default, such as SELinux and Address Space Layout Randomization (ASLR). Least functionality and process isolation minimizes the attack surface by disabling unauthorized services and ports and containing any corruption within the originating process, preventing it from affecting other processes or the system as a whole.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "RHBZ#2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: memory leak in tiffcrop.c"
},
{
"cve": "CVE-2023-26965",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215206"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in LibTIFF\u0027s tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-416: Use After Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure that only authorized users and roles can execute or modify code. Red Hat also enforces least functionality, enabling only essential features, services, and ports. Hardening guidelines ensure the most restrictive settings required for operations, while baseline configurations enforce safe memory allocation and deallocation practices to reduce the risk of use-after-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code and provide real-time visibility into memory usage, lowering the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents a compromised process from accessing memory freed by another, containing potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26965"
},
{
"category": "external",
"summary": "RHBZ#2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c"
},
{
"cve": "CVE-2023-26966",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to an out-of-bounds read in the uv_encode function in libtiff/tif_luv.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow in uv_encode()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to the team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "RHBZ#2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966"
}
],
"release_date": "2023-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow in uv_encode()"
}
]
}
rhsa-2023_6575
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: null pointer dereference in LZWDecode() in libtiff/tif_lzw.c (CVE-2023-2731)\n\n* libtiff: tiffcrop: null pointer dereference in TIFFClose() (CVE-2023-3316)\n\n* libtiff: memory leak in tiffcrop.c (CVE-2023-3576)\n\n* libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c (CVE-2023-26965)\n\n* libtiff: Buffer Overflow in uv_encode() (CVE-2023-26966)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6575",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index"
},
{
"category": "external",
"summary": "2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6575.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2024-11-23T00:18:56+00:00",
"generator": {
"date": "2024-11-23T00:18:56+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2023:6575",
"initial_release_date": "2023-11-07T08:13:41+00:00",
"revision_history": [
{
"date": "2023-11-07T08:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-07T08:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-23T00:18:56+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.src",
"product": {
"name": "libtiff-0:4.4.0-10.el9.src",
"product_id": "libtiff-0:4.4.0-10.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-0:4.4.0-10.el9.i686",
"product_id": "libtiff-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_id": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-2731",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2207635"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in Libtiff\u0027s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2731"
},
{
"category": "external",
"summary": "RHBZ#2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731"
}
],
"release_date": "2023-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c"
},
{
"cve": "CVE-2023-3316",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216080"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in LibTiff. A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: tiffcrop: null pointer dereference in TIFFClose()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "RHBZ#2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316"
}
],
"release_date": "2023-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: tiffcrop: null pointer dereference in TIFFClose()"
},
{
"cve": "CVE-2023-3576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219340"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: memory leak in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "RHBZ#2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: memory leak in tiffcrop.c"
},
{
"cve": "CVE-2023-26965",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215206"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in LibTIFF\u0027s tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26965"
},
{
"category": "external",
"summary": "RHBZ#2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c"
},
{
"cve": "CVE-2023-26966",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to an out-of-bounds read in the uv_encode function in libtiff/tif_luv.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow in uv_encode()",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "RHBZ#2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966"
}
],
"release_date": "2023-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow in uv_encode()"
}
]
}
RHSA-2023:6575
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: null pointer dereference in LZWDecode() in libtiff/tif_lzw.c (CVE-2023-2731)\n\n* libtiff: tiffcrop: null pointer dereference in TIFFClose() (CVE-2023-3316)\n\n* libtiff: memory leak in tiffcrop.c (CVE-2023-3576)\n\n* libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c (CVE-2023-26965)\n\n* libtiff: Buffer Overflow in uv_encode() (CVE-2023-26966)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.3 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:6575",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.3_release_notes/index"
},
{
"category": "external",
"summary": "2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_6575.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2025-11-21T18:49:19+00:00",
"generator": {
"date": "2025-11-21T18:49:19+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2023:6575",
"initial_release_date": "2023-11-07T08:13:41+00:00",
"revision_history": [
{
"date": "2023-11-07T08:13:41+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-11-07T08:13:41+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T18:49:19+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product": {
"name": "Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.src",
"product": {
"name": "libtiff-0:4.4.0-10.el9.src",
"product_id": "libtiff-0:4.4.0-10.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_id": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-0:4.4.0-10.el9.i686",
"product_id": "libtiff-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_id": "libtiff-devel-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_id": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-devel-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-10.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_id": "libtiff-tools-0:4.4.0-10.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-10.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "AppStream-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.src as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src"
},
"product_reference": "libtiff-0:4.4.0-10.el9.src",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"relates_to_product_reference": "CRB-9.3.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64 as a component of Red Hat CodeReady Linux Builder (v. 9)",
"product_id": "CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"relates_to_product_reference": "CRB-9.3.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2017-17095",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2017-12-11T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1524284"
}
],
"notes": [
{
"category": "description",
"text": "tools/pal2rgb.c in pal2rgb in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (TIFFSetupStrips heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "This vulnerability is rated as moderate because it allows a remote attacker to trigger a denial of service through a heap-based buffer overflow, exploiting this flaw would crash the application, affecting availability without compromising system integrity.\n\nThis vulnerability affects the pal2rgb executable which is part of the tools distributed with libtiff upstream, but shipped in libtiff-tools RPM package instead of libtiff package on Red Hat Enterprise Linux distribution.\n\nWithin regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-122: Heap-based Buffer Overflow vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token, multi-factor authentication (MFA), which is coupled with least privilege principles to ensure that only authorized roles and users can execute or manipulate code. Red Hat enforces the principle of least functionality, ensuring that only essential features, services, and ports are enabled. This minimizes the number of components that could be affected by heap-based buffer overflow exploitations. The environment leverages malicious code protections such as IPS/IDS and antimalware solutions that detect and respond to indicators in real time, preventing or limiting the impact of exploitation attempts. Static code analysis and peer code review techniques ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory buffer overflows and denial-of-service attacks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2017-17095"
},
{
"category": "external",
"summary": "RHBZ#1524284",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1524284"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2017-17095",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17095"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2017-17095",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2017-17095"
}
],
"release_date": "2017-11-29T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap-based buffer overflow in tools/pal2rgb.c can lead to denial of service"
},
{
"cve": "CVE-2023-2731",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-05-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2207635"
}
],
"notes": [
{
"category": "description",
"text": "A NULL pointer dereference flaw was found in Libtiff\u0027s LZWDecode() function in the libtiff/tif_lzw.c file. This flaw allows a local attacker to craft specific input data that can cause the program to dereference a NULL pointer when decompressing a TIFF format file, resulting in a program crash or denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-2731"
},
{
"category": "external",
"summary": "RHBZ#2207635",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2207635"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-2731"
}
],
"release_date": "2023-04-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: null pointer deference in LZWDecode() in libtiff/tif_lzw.c"
},
{
"cve": "CVE-2023-3316",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"discovery_date": "2023-06-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2216080"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in LibTiff. A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: tiffcrop: null pointer dereference in TIFFClose()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-476: NULL Pointer Dereference vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nThe platform incorporates secure engineering principles and controls to enforce secure coding practices, including proper memory handling and error checking, reducing the likelihood of null pointer dereference vulnerabilities. Coding standards, tools, and processes support early detection and prevention of memory-related flaws. Static code analysis identifies null dereference and related issues during development, while system monitoring detects memory errors and anomalous behavior in the event of exploitation. Additionally, the platform leverages memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) to strengthen resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "RHBZ#2216080",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2216080"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3316"
}
],
"release_date": "2023-06-19T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: tiffcrop: null pointer dereference in TIFFClose()"
},
{
"cve": "CVE-2023-3576",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-03-09T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2219340"
}
],
"notes": [
{
"category": "description",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: memory leak in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nSecure baseline configurations provide a strong foundation for maintaining a secure and resilient environment. Rigorous testing and development practices (SAST, DAST, etc.) identify and address memory vulnerabilities before they are promoted to Red Hat production platforms, and the malicious code protection used further mitigates impacts by detecting, blocking, and responding to exploitation attempts. The platform uses OS versions that inherit certain security tools and features from RHEL that are enabled by default, such as SELinux and Address Space Layout Randomization (ASLR). Least functionality and process isolation minimizes the attack surface by disabling unauthorized services and ports and containing any corruption within the originating process, preventing it from affecting other processes or the system as a whole.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "RHBZ#2219340",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576"
}
],
"release_date": "2023-03-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: memory leak in tiffcrop.c"
},
{
"cve": "CVE-2023-26965",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"discovery_date": "2023-06-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2215206"
}
],
"notes": [
{
"category": "description",
"text": "A heap use-after-free vulnerability was found in LibTIFF\u0027s tiffcrop utility in the loadImage() function. This flaw allows an attacker to pass a crafted TIFF image file to the tiffcrop utility, which causes an out-of-bounds write access, resulting in an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-416: Use After Free vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nAccess to the platform is granted only after successful hard token-based multi-factor authentication (MFA) and is governed by least privilege to ensure that only authorized users and roles can execute or modify code. Red Hat also enforces least functionality, enabling only essential features, services, and ports. Hardening guidelines ensure the most restrictive settings required for operations, while baseline configurations enforce safe memory allocation and deallocation practices to reduce the risk of use-after-free vulnerabilities. The environment employs IPS/IDS and antimalware solutions to detect and prevent malicious code and provide real-time visibility into memory usage, lowering the risk of arbitrary code execution. Static code analysis and peer reviews enforce strong input validation and error handling, reducing the likelihood of denial-of-service (DoS) attacks. In the event of successful exploitation, process isolation prevents a compromised process from accessing memory freed by another, containing potential impact. Finally, memory protection mechanisms such as Data Execution Prevention (DEP) and Address Space Layout Randomization (ASLR) enhance resilience against memory-related vulnerabilities.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26965"
},
{
"category": "external",
"summary": "RHBZ#2215206",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2215206"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26965"
}
],
"release_date": "2023-06-14T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap-based use after free via a crafted TIFF image in loadImage() in tiffcrop.c"
},
{
"cve": "CVE-2023-26966",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218749"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to an out-of-bounds read in the uv_encode function in libtiff/tif_luv.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow in uv_encode()",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Within regulated environments, a combination of the following controls acts as a significant barrier to successfully exploiting a CWE-120: Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027) vulnerability and therefore downgrades the severity of this particular CVE from Moderate to Low.\n\nRed Hat follows best practice and federal requirements for least privilege, allowing only specific processes to be run with isolated accounts specific to the team and federal platforms that have limited privileges that are only used for a single task. The environment leverages file integrity checks and malicious code protections, such as IPS/IDS and antimalware solutions, to help detect and prevent malicious code that attempts to exploit buffer overflow vulnerabilities. Robust input validation and error-handling mechanisms ensure all user inputs are thoroughly validated, preventing improperly validated inputs from causing system instability, exposing sensitive data, or escalating risks.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "RHBZ#2218749",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218749"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-26966"
}
],
"release_date": "2023-02-15T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-11-07T08:13:41+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"AppStream-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"AppStream-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.src",
"CRB-9.3.0.GA:libtiff-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debuginfo-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-debugsource-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-devel-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-0:4.4.0-10.el9.x86_64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.aarch64",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.i686",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.ppc64le",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.s390x",
"CRB-9.3.0.GA:libtiff-tools-debuginfo-0:4.4.0-10.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow in uv_encode()"
}
]
}
CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2014-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2015-7182",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
},
{
"name": "CVE-2015-7181",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
},
{
"name": "CVE-2015-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
},
{
"name": "CVE-2016-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
},
{
"name": "CVE-2017-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2018-20677",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2018-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-34102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2013-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
},
{
"name": "CVE-2014-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
},
{
"name": "CVE-2017-11613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
},
{
"name": "CVE-2017-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
},
{
"name": "CVE-2017-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
},
{
"name": "CVE-2017-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
},
{
"name": "CVE-2017-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
},
{
"name": "CVE-2017-12627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
},
{
"name": "CVE-2017-18013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
},
{
"name": "CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2018-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
},
{
"name": "CVE-2018-17000",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
},
{
"name": "CVE-2018-17100",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
},
{
"name": "CVE-2018-17101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
},
{
"name": "CVE-2018-19210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
},
{
"name": "CVE-2018-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
},
{
"name": "CVE-2018-7456",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
},
{
"name": "CVE-2019-10255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
},
{
"name": "CVE-2019-14973",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
},
{
"name": "CVE-2019-17546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
},
{
"name": "CVE-2019-6128",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
},
{
"name": "CVE-2020-15110",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
},
{
"name": "CVE-2020-18768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
},
{
"name": "CVE-2020-19131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
},
{
"name": "CVE-2020-19144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
},
{
"name": "CVE-2020-26261",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
},
{
"name": "CVE-2020-35521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
},
{
"name": "CVE-2020-35522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
},
{
"name": "CVE-2020-35523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
},
{
"name": "CVE-2020-35524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
},
{
"name": "CVE-2020-36191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
},
{
"name": "CVE-2021-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-38288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
},
{
"name": "CVE-2023-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
},
{
"name": "CVE-2023-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
},
{
"name": "CVE-2023-4759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2023-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2023-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
},
{
"name": "CVE-2024-25016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
},
{
"name": "CVE-2024-29896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
},
{
"name": "CVE-2024-41752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
},
{
"name": "CVE-2024-45082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
}
],
"initial_release_date": "2024-12-20T00:00:00",
"last_revision_date": "2024-12-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1103",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
"url": "https://www.ibm.com/support/pages/node/7177142"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
"url": "https://www.ibm.com/support/pages/node/7177223"
},
{
"published_at": "2024-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
"url": "https://www.ibm.com/support/pages/node/7179044"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
"url": "https://www.ibm.com/support/pages/node/7179156"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
"url": "https://www.ibm.com/support/pages/node/7179166"
},
{
"published_at": "2024-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
"url": "https://www.ibm.com/support/pages/node/7178835"
}
]
}
CERTFR-2025-AVI-0969
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | GenAI sur Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.90.x | ||
| VMware | Tanzu Kubernetes Runtime | NodeJS Buildpack versions antérieures à 1.8.58 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.63 | ||
| VMware | Tanzu Kubernetes Runtime | VMware Tanzu pour MySQL sur Tanzu Platform versions antérieures à 10.1.0 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.49 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Platform versions antérieures à 1.16.14 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.915.x | ||
| VMware | Tanzu Application Service | CredHub Service Broker versions antérieures à 1.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions antérieures à 10.2.4+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.915.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry Windows versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour VMware Tanzu Application Service versions antérieures à 1.16.13 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.943.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 6.0.20+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.77.x | ||
| VMware | Services Suite | Platform Automation Toolkit versions antérieures à 5.3.2 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions antérieures à 1.906.x | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour VMware Tanzu versions antérieures à 1.14.9 | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour VMware Tanzu Platform versions antérieures à 250.5.9 | ||
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Services pour VMware Tanzu versions antérieures à 3.3.10 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Concourse pour VMware Tanzu versions antérieures à 7.14.1+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Platform pour Cloud Foundry isolation segment versions antérieures à 10.2.3+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Services pour VMware Tanzu Platform versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.46 | ||
| VMware | Tanzu Kubernetes Runtime | Elastic Application Runtime pour VMware Tanzu Platform versions antérieures à 6.0.21+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Telemetry pour VMware Tanzu Platform versions antérieures à 2.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.103.x | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.906.x |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "GenAI sur Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.90.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.58",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.63",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour MySQL sur Tanzu Platform versions ant\u00e9rieures \u00e0 10.1.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.49",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.14",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "CredHub Service Broker versions ant\u00e9rieures \u00e0 1.6.6",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime Windows add-on pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.4+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.915.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry Windows versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.13",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.943.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.20+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.77.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.3.2",
"product": {
"name": "Services Suite",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow pour VMware Tanzu versions ant\u00e9rieures \u00e0 1.14.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 250.5.9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services pour VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.10",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Concourse pour VMware Tanzu versions ant\u00e9rieures \u00e0 7.14.1+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform pour Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.2.3+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Services pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.46",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Elastic Application Runtime pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.21+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.103.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.0",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.906.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2024-37370",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37370"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-57981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57981"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2022-25308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25308"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-27102",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27102"
},
{
"name": "CVE-2022-43236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43236"
},
{
"name": "CVE-2024-20919",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20919"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2017-6834",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6834"
},
{
"name": "CVE-2025-22003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22003"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2023-21938",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21938"
},
{
"name": "CVE-2023-3428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3428"
},
{
"name": "CVE-2021-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3933"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-43237",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43237"
},
{
"name": "CVE-2021-23215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23215"
},
{
"name": "CVE-2022-1115",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1115"
},
{
"name": "CVE-2024-57994",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57994"
},
{
"name": "CVE-2025-21798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21798"
},
{
"name": "CVE-2025-3264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3264"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2020-14621",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14621"
},
{
"name": "CVE-2025-26465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26465"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21980"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2025-21889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21889"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2023-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3195"
},
{
"name": "CVE-2025-59830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59830"
},
{
"name": "CVE-2023-21843",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21843"
},
{
"name": "CVE-2021-20243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20243"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-1175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1175"
},
{
"name": "CVE-2024-57948",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57948"
},
{
"name": "CVE-2025-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21937"
},
{
"name": "CVE-2014-9157",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9157"
},
{
"name": "CVE-2020-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2803"
},
{
"name": "CVE-2020-14803",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14803"
},
{
"name": "CVE-2024-58088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58088"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2025-53042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53042"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2025-21689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21689"
},
{
"name": "CVE-2025-21682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21682"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2021-26260",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26260"
},
{
"name": "CVE-2023-0922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0922"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2017-18250",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18250"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-40002",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40002"
},
{
"name": "CVE-2022-21426",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21426"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2024-58010",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58010"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-21697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21697"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2024-57973",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57973"
},
{
"name": "CVE-2022-24407",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24407"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2022-2874",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2874"
},
{
"name": "CVE-2025-22017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22017"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-21783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21783"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2021-3733",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3733"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-21786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21786"
},
{
"name": "CVE-2024-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11187"
},
{
"name": "CVE-2020-27769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27769"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2021-35586",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35586"
},
{
"name": "CVE-2014-9748",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9748"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2022-1623",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1623"
},
{
"name": "CVE-2025-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21881"
},
{
"name": "CVE-2025-21951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21951"
},
{
"name": "CVE-2024-38829",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38829"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2017-6831",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6831"
},
{
"name": "CVE-2024-58034",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58034"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2021-3997",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3997"
},
{
"name": "CVE-2025-50102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50102"
},
{
"name": "CVE-2023-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38471"
},
{
"name": "CVE-2022-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0158"
},
{
"name": "CVE-2020-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27776"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-21743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21743"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2023-34475",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34475"
},
{
"name": "CVE-2024-26896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26896"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-55248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55248"
},
{
"name": "CVE-2024-24762",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24762"
},
{
"name": "CVE-2025-53643",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53643"
},
{
"name": "CVE-2022-0696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0696"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-12380",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12380"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2021-35550",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35550"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-21847",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21847"
},
{
"name": "CVE-2022-2929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2929"
},
{
"name": "CVE-2018-15120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15120"
},
{
"name": "CVE-2024-58069",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58069"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21871"
},
{
"name": "CVE-2023-51385",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51385"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-4287",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4287"
},
{
"name": "CVE-2024-43788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43788"
},
{
"name": "CVE-2025-21731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21731"
},
{
"name": "CVE-2023-48237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48237"
},
{
"name": "CVE-2023-48706",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48706"
},
{
"name": "CVE-2021-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3605"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-25126",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25126"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2017-10928",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10928"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2021-35567",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35567"
},
{
"name": "CVE-2017-12429",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12429"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2024-52615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52615"
},
{
"name": "CVE-2020-14579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14579"
},
{
"name": "CVE-2023-2157",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2157"
},
{
"name": "CVE-2025-32386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32386"
},
{
"name": "CVE-2025-21823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21823"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2024-26700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26700"
},
{
"name": "CVE-2024-58082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58082"
},
{
"name": "CVE-2024-35176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35176"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2025-55551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55551"
},
{
"name": "CVE-2025-50100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50100"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2025-21763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21763"
},
{
"name": "CVE-2023-21954",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21954"
},
{
"name": "CVE-2025-40780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40780"
},
{
"name": "CVE-2023-48368",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48368"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2023-21939",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21939"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2023-24757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24757"
},
{
"name": "CVE-2024-20926",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20926"
},
{
"name": "CVE-2025-21678",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21678"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2022-31683",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31683"
},
{
"name": "CVE-2020-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22218"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-53062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53062"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21872"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2021-2163",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2163"
},
{
"name": "CVE-2025-21922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21922"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2017-6832",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6832"
},
{
"name": "CVE-2022-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2208"
},
{
"name": "CVE-2024-45720",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45720"
},
{
"name": "CVE-2022-1056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1056"
},
{
"name": "CVE-2018-10805",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10805"
},
{
"name": "CVE-2019-19906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19906"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2020-15095",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15095"
},
{
"name": "CVE-2018-16328",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16328"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2025-5745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5745"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2022-43239",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43239"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2022-32546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32546"
},
{
"name": "CVE-2025-0838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0838"
},
{
"name": "CVE-2024-57980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57980"
},
{
"name": "CVE-2023-5441",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5441"
},
{
"name": "CVE-2025-55553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55553"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-21796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21796"
},
{
"name": "CVE-2024-12086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12086"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-21691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21691"
},
{
"name": "CVE-2021-4219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4219"
},
{
"name": "CVE-2018-15798",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15798"
},
{
"name": "CVE-2025-55154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55154"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-3153",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3153"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2025-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5197"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2017-11447",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11447"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2023-39593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39593"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-46569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46569"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2018-14434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14434"
},
{
"name": "CVE-2019-6293",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6293"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-21738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2025-21684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21684"
},
{
"name": "CVE-2023-50868",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50868"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2023-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21830"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2021-2161",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2161"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2021-2341",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2341"
},
{
"name": "CVE-2021-3468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3468"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-58061",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58061"
},
{
"name": "CVE-2025-46148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46148"
},
{
"name": "CVE-2024-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58058"
},
{
"name": "CVE-2025-21768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21768"
},
{
"name": "CVE-2025-21864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21864"
},
{
"name": "CVE-2025-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2149"
},
{
"name": "CVE-2021-3502",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3502"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2018-16329",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16329"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58056"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-50080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50080"
},
{
"name": "CVE-2025-21725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21725"
},
{
"name": "CVE-2024-43790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43790"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-22009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22009"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2022-45061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45061"
},
{
"name": "CVE-2025-21727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21727"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2022-43240",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43240"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-5987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5987"
},
{
"name": "CVE-2023-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4091"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2021-20312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20312"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2953"
},
{
"name": "CVE-2020-14593",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14593"
},
{
"name": "CVE-2025-21904",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21904"
},
{
"name": "CVE-2019-20838",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20838"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2025-50078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50078"
},
{
"name": "CVE-2022-28739",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28739"
},
{
"name": "CVE-2024-26726",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26726"
},
{
"name": "CVE-2023-52593",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52593"
},
{
"name": "CVE-2025-3933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3933"
},
{
"name": "CVE-2023-26785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26785"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2020-14664",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14664"
},
{
"name": "CVE-2023-48235",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48235"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-21668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21668"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2024-44939",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-44939"
},
{
"name": "CVE-2024-43374",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43374"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2025-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21929"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2020-14797",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14797"
},
{
"name": "CVE-2025-21735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21735"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2024-27280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27280"
},
{
"name": "CVE-2025-3000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3000"
},
{
"name": "CVE-2022-3213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3213"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2021-23177",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23177"
},
{
"name": "CVE-2020-14798",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14798"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-5878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5878"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2024-58063",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58063"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2024-41957",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41957"
},
{
"name": "CVE-2025-38500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38500"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-24293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24293"
},
{
"name": "CVE-2025-8961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8961"
},
{
"name": "CVE-2025-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21977"
},
{
"name": "CVE-2022-25147",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25147"
},
{
"name": "CVE-2025-21779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21779"
},
{
"name": "CVE-2024-58005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58005"
},
{
"name": "CVE-2025-21674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21674"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-21918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21918"
},
{
"name": "CVE-2025-38203",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38203"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2022-0909",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0909"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2023-28154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28154"
},
{
"name": "CVE-2023-48231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48231"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2023-38633",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38633"
},
{
"name": "CVE-2025-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21948"
},
{
"name": "CVE-2023-2609",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2609"
},
{
"name": "CVE-2025-53905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53905"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2021-46312",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46312"
},
{
"name": "CVE-2018-14628",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14628"
},
{
"name": "CVE-2022-21299",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21299"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2019-6461",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6461"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2020-2773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2773"
},
{
"name": "CVE-2015-5262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5262"
},
{
"name": "CVE-2022-43244",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43244"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2025-21753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21753"
},
{
"name": "CVE-2017-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6004"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2023-45922",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45922"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21699"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2024-20921",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20921"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2020-14578",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14578"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2025-40004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40004"
},
{
"name": "CVE-2017-7619",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7619"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2020-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2805"
},
{
"name": "CVE-2025-21712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21712"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-57982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57982"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2025-21746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21746"
},
{
"name": "CVE-2022-0391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0391"
},
{
"name": "CVE-2023-1170",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1170"
},
{
"name": "CVE-2022-24070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24070"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2019-17547",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17547"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2021-36411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36411"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2018-10919",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10919"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2020-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2830"
},
{
"name": "CVE-2025-53014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53014"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2022-21624",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21624"
},
{
"name": "CVE-2020-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2781"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2018-10804",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10804"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2022-0907",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0907"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2022-21305",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21305"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2021-3670",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3670"
},
{
"name": "CVE-2021-38297",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38297"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21836"
},
{
"name": "CVE-2025-21715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21715"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2020-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10735"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2020-14556",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14556"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-50085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50085"
},
{
"name": "CVE-2025-21781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21781"
},
{
"name": "CVE-2024-58054",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58054"
},
{
"name": "CVE-2024-43398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43398"
},
{
"name": "CVE-2020-14792",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14792"
},
{
"name": "CVE-2019-16776",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16776"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2022-28738",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28738"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2024-8508",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8508"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2025-41248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41248"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2025-40364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40364"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-61985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61985"
},
{
"name": "CVE-2013-2064",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2064"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-21772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21772"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-21271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21271"
},
{
"name": "CVE-2024-58070",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58070"
},
{
"name": "CVE-2025-61919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61919"
},
{
"name": "CVE-2023-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25193"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2020-25663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25663"
},
{
"name": "CVE-2022-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0156"
},
{
"name": "CVE-2025-21914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21914"
},
{
"name": "CVE-2024-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58057"
},
{
"name": "CVE-2025-0306",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0306"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-58007",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58007"
},
{
"name": "CVE-2023-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1355"
},
{
"name": "CVE-2025-21995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21995"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2025-21868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21868"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37967"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2025-21915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21915"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2025-21792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21792"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2025-55560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55560"
},
{
"name": "CVE-2025-21728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21728"
},
{
"name": "CVE-2024-58018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58018"
},
{
"name": "CVE-2023-42669",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42669"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-61771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61771"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2025-61770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61770"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2023-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22081"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2023-42670",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42670"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2024-58090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58090"
},
{
"name": "CVE-2025-59842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59842"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2024-27766",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27766"
},
{
"name": "CVE-2025-37958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37958"
},
{
"name": "CVE-2025-21714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21714"
},
{
"name": "CVE-2024-58078",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58078"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-21972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21972"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2023-34153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34153"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2020-14153",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14153"
},
{
"name": "CVE-2022-1114",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1114"
},
{
"name": "CVE-2023-48233",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48233"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2022-21626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21626"
},
{
"name": "CVE-2011-2207",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2207"
},
{
"name": "CVE-2025-54874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54874"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2024-53124",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53124"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-21830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21830"
},
{
"name": "CVE-2018-12600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12600"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2021-41771",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41771"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2020-14781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14781"
},
{
"name": "CVE-2016-3189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3189"
},
{
"name": "CVE-2023-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4154"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-0714",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0714"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-9340",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9340"
},
{
"name": "CVE-2023-24758",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24758"
},
{
"name": "CVE-2025-55552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55552"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2016-7531",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7531"
},
{
"name": "CVE-2006-3082",
"url": "https://www.cve.org/CVERecord?id=CVE-2006-3082"
},
{
"name": "CVE-2023-5341",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5341"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-21767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21767"
},
{
"name": "CVE-2025-3262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3262"
},
{
"name": "CVE-2025-21986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21986"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2023-34968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34968"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-21961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21961"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2016-10062",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10062"
},
{
"name": "CVE-2025-21764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21764"
},
{
"name": "CVE-2024-57974",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57974"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2023-34152",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34152"
},
{
"name": "CVE-2022-43249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43249"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2024-58085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58085"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-21690",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21690"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2024-57996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57996"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2022-43242",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43242"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2019-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14844"
},
{
"name": "CVE-2022-21366",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21366"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2025-21946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21946"
},
{
"name": "CVE-2025-21838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21838"
},
{
"name": "CVE-2025-21982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21982"
},
{
"name": "CVE-2025-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21867"
},
{
"name": "CVE-2025-21666",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21666"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2025-53859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53859"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-21828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21828"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-23167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23167"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-21704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21704"
},
{
"name": "CVE-2025-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21936"
},
{
"name": "CVE-2022-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0865"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2025-43859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43859"
},
{
"name": "CVE-2024-58013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58013"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2016-7514",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-7514"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-21909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21909"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2025-9092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9092"
},
{
"name": "CVE-2025-21766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21766"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2024-54677",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54677"
},
{
"name": "CVE-2021-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3598"
},
{
"name": "CVE-2025-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21880"
},
{
"name": "CVE-2025-50094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50094"
},
{
"name": "CVE-2021-35559",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35559"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2023-1264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1264"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-58266",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58266"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2025-50098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50098"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2022-4293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4293"
},
{
"name": "CVE-2025-37974",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37974"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2024-57834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57834"
},
{
"name": "CVE-2025-55197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55197"
},
{
"name": "CVE-2022-32743",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32743"
},
{
"name": "CVE-2025-55558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55558"
},
{
"name": "CVE-2022-21291",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21291"
},
{
"name": "CVE-2024-58017",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58017"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-26603",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26603"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2025-21809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21809"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2021-32490",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32490"
},
{
"name": "CVE-2020-27768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27768"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-50086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50086"
},
{
"name": "CVE-2016-5118",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5118"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2023-46045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46045"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-55557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55557"
},
{
"name": "CVE-2024-12085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12085"
},
{
"name": "CVE-2022-24599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24599"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-2999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2999"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2025-21910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21910"
},
{
"name": "CVE-2021-35452",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35452"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2021-35565",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35565"
},
{
"name": "CVE-2020-10251",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10251"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-21745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21745"
},
{
"name": "CVE-2025-21791",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21791"
},
{
"name": "CVE-2020-18781",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18781"
},
{
"name": "CVE-2025-7709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7709"
},
{
"name": "CVE-2024-52559",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52559"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2017-7186",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7186"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37750"
},
{
"name": "CVE-2021-39293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39293"
},
{
"name": "CVE-2025-21795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21795"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-9640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9640"
},
{
"name": "CVE-2022-1897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1897"
},
{
"name": "CVE-2022-43248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43248"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2024-58081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58081"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-21814",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21814"
},
{
"name": "CVE-2025-50082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50082"
},
{
"name": "CVE-2017-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6829"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-50097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50097"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-21911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21911"
},
{
"name": "CVE-2023-24752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24752"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2022-43245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43245"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-50084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50084"
},
{
"name": "CVE-2018-9133",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9133"
},
{
"name": "CVE-2025-50079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50079"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-21758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21758"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-21816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21816"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2021-35603",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35603"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2021-36410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36410"
},
{
"name": "CVE-2025-21780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21780"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2024-12705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12705"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-21787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21787"
},
{
"name": "CVE-2023-28487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28487"
},
{
"name": "CVE-2023-22067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22067"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-21776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21776"
},
{
"name": "CVE-2024-58003",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58003"
},
{
"name": "CVE-2025-21917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21917"
},
{
"name": "CVE-2025-21706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21706"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-55193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55193"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-38727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38727"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2022-0319",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0319"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-4565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4565"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-21736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21736"
},
{
"name": "CVE-2025-21997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21997"
},
{
"name": "CVE-2025-21741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21741"
},
{
"name": "CVE-2020-18032",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18032"
},
{
"name": "CVE-2017-6833",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6833"
},
{
"name": "CVE-2025-21808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21808"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2020-2754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2754"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-58076",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58076"
},
{
"name": "CVE-2023-24751",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24751"
},
{
"name": "CVE-2025-21708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21708"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2021-4048",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4048"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2022-2980",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2980"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21720"
},
{
"name": "CVE-2025-32463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32463"
},
{
"name": "CVE-2015-7747",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7747"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2024-41965",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41965"
},
{
"name": "CVE-2020-14796",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14796"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2025-55004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55004"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2023-51767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51767"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2023-6918",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6918"
},
{
"name": "CVE-2023-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38037"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-53023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53023"
},
{
"name": "CVE-2025-21711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21711"
},
{
"name": "CVE-2025-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2998"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2021-20313",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20313"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21978"
},
{
"name": "CVE-2019-16777",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16777"
},
{
"name": "CVE-2025-21760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21760"
},
{
"name": "CVE-2023-45913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45913"
},
{
"name": "CVE-2018-13153",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13153"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2023-48236",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48236"
},
{
"name": "CVE-2025-21947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21947"
},
{
"name": "CVE-2025-21913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21913"
},
{
"name": "CVE-2023-34474",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34474"
},
{
"name": "CVE-2025-21665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21665"
},
{
"name": "CVE-2025-38227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38227"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2024-58079",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58079"
},
{
"name": "CVE-2025-21966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21966"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2021-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45931"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2021-28544",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28544"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2025-21734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21734"
},
{
"name": "CVE-2025-32728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32728"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2021-44964",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44964"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2018-14437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14437"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-21890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21890"
},
{
"name": "CVE-2025-61984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61984"
},
{
"name": "CVE-2021-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3596"
},
{
"name": "CVE-2025-21916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21916"
},
{
"name": "CVE-2025-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21925"
},
{
"name": "CVE-2024-57883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57883"
},
{
"name": "CVE-2022-21628",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21628"
},
{
"name": "CVE-2017-6830",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6830"
},
{
"name": "CVE-2025-21927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21927"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2024-47814",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47814"
},
{
"name": "CVE-2022-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2923"
},
{
"name": "CVE-2025-21799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21799"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-21748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21748"
},
{
"name": "CVE-2025-21785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21785"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2021-46310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46310"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2021-2369",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2369"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2024-58086",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58086"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2022-37454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37454"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-21898",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21898"
},
{
"name": "CVE-2020-14152",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14152"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2024-58051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58051"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-56337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56337"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-9390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9390"
},
{
"name": "CVE-2025-62813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62813"
},
{
"name": "CVE-2025-21857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21857"
},
{
"name": "CVE-2019-9904",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9904"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2022-42919",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42919"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-1981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1981"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-2231",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2231"
},
{
"name": "CVE-2025-46150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46150"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2025-21812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21812"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2023-28120",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28120"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-21848",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21848"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-50096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50096"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-21683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21683"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2020-35492",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35492"
},
{
"name": "CVE-2025-21908",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21908"
},
{
"name": "CVE-2023-1289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1289"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2023-6349",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6349"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-9341",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9341"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2017-7244",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7244"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2025-21895",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21895"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2018-16412",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16412"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2019-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6462"
},
{
"name": "CVE-2025-21935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21935"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2021-32493",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32493"
},
{
"name": "CVE-2023-24754",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24754"
},
{
"name": "CVE-2020-29509",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29509"
},
{
"name": "CVE-2023-5568",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5568"
},
{
"name": "CVE-2023-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38470"
},
{
"name": "CVE-2025-21675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21675"
},
{
"name": "CVE-2023-34967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34967"
},
{
"name": "CVE-2025-38237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38237"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2021-4189",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4189"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2023-35945",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35945"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2024-58019",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58019"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2024-26146",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26146"
},
{
"name": "CVE-2025-21888",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21888"
},
{
"name": "CVE-2025-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21866"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-3730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3730"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2024-57990",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57990"
},
{
"name": "CVE-2021-29921",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29921"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-5351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5351"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2022-1622",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1622"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-49582",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49582"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-31344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31344"
},
{
"name": "CVE-2025-21976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21976"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2024-57975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57975"
},
{
"name": "CVE-2020-14581",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14581"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2021-32491",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32491"
},
{
"name": "CVE-2025-50077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50077"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22025"
},
{
"name": "CVE-2021-43527",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43527"
},
{
"name": "CVE-2022-0924",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0924"
},
{
"name": "CVE-2025-24014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24014"
},
{
"name": "CVE-2022-33068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33068"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2024-58068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58068"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2024-57998",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57998"
},
{
"name": "CVE-2021-3426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3426"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-1304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1304"
},
{
"name": "CVE-2021-2388",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2388"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2025-38206",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38206"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-39908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39908"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-21862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21862"
},
{
"name": "CVE-2023-47282",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47282"
},
{
"name": "CVE-2016-20012",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-20012"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2025-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21950"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2019-3792",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3792"
},
{
"name": "CVE-2022-43235",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43235"
},
{
"name": "CVE-2025-50092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50092"
},
{
"name": "CVE-2025-50099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50099"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2025-22001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22001"
},
{
"name": "CVE-2024-10524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10524"
},
{
"name": "CVE-2025-40017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40017"
},
{
"name": "CVE-2023-45919",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45919"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-3263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3263"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2018-15607",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15607"
},
{
"name": "CVE-2025-21899",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21899"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-40778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40778"
},
{
"name": "CVE-2025-21719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21719"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-21718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21718"
},
{
"name": "CVE-2025-3001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3001"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2021-35588",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35588"
},
{
"name": "CVE-2022-32545",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32545"
},
{
"name": "CVE-2025-21694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21694"
},
{
"name": "CVE-2025-41244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41244"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-21820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21820"
},
{
"name": "CVE-2017-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6838"
},
{
"name": "CVE-2024-41946",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41946"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-41817",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41817"
},
{
"name": "CVE-2024-57979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57979"
},
{
"name": "CVE-2024-58071",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58071"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2017-6835",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6835"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2024-12087",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12087"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2022-23806",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23806"
},
{
"name": "CVE-2022-21365",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21365"
},
{
"name": "CVE-2025-21943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21943"
},
{
"name": "CVE-2019-16775",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16775"
},
{
"name": "CVE-2024-57997",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57997"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-6051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6051"
},
{
"name": "CVE-2022-21283",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21283"
},
{
"name": "CVE-2022-31782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31782"
},
{
"name": "CVE-2025-50093",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50093"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-32434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32434"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-53069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53069"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2025-21806",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21806"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2022-43253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43253"
},
{
"name": "CVE-2021-36221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36221"
},
{
"name": "CVE-2024-57977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57977"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2025-53019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53019"
},
{
"name": "CVE-2020-14782",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14782"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-57952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57952"
},
{
"name": "CVE-2025-53367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53367"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2021-45942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45942"
},
{
"name": "CVE-2022-1615",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1615"
},
{
"name": "CVE-2025-21928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21928"
},
{
"name": "CVE-2021-20246",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20246"
},
{
"name": "CVE-2025-21707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21707"
},
{
"name": "CVE-2023-24755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24755"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2023-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21937"
},
{
"name": "CVE-2022-23773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23773"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2024-27281",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27281"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-21804",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21804"
},
{
"name": "CVE-2021-34558",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34558"
},
{
"name": "CVE-2021-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3737"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2017-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6837"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-21934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21934"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2025-53044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53044"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-22011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22011"
},
{
"name": "CVE-2022-1725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1725"
},
{
"name": "CVE-2022-43252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43252"
},
{
"name": "CVE-2023-0614",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0614"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2024-5197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5197"
},
{
"name": "CVE-2020-21606",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21606"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2022-40674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40674"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-50087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50087"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2025-38617",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38617"
},
{
"name": "CVE-2025-21762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21762"
},
{
"name": "CVE-2023-47169",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47169"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-21801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21801"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-21692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21692"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2022-21434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21434"
},
{
"name": "CVE-2025-2148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2148"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2023-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38469"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2022-3821",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3821"
},
{
"name": "CVE-2014-3577",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3577"
},
{
"name": "CVE-2025-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21869"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2023-52970",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52970"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2016-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5841"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2025-53101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53101"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2022-44267",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44267"
},
{
"name": "CVE-2024-26141",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26141"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2019-8321",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8321"
},
{
"name": "CVE-2025-21826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21826"
},
{
"name": "CVE-2025-29768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29768"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2022-23772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23772"
},
{
"name": "CVE-2022-21294",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21294"
},
{
"name": "CVE-2025-21750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21750"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2024-57924",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57924"
},
{
"name": "CVE-2025-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21912"
},
{
"name": "CVE-2018-13440",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13440"
},
{
"name": "CVE-2022-42898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42898"
},
{
"name": "CVE-2025-46393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46393"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2021-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-0561"
},
{
"name": "CVE-2018-12599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12599"
},
{
"name": "CVE-2025-21859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21859"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2022-1587",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1587"
},
{
"name": "CVE-2025-21825",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21825"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2017-7246",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7246"
},
{
"name": "CVE-2020-2755",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2755"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2022-0284",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0284"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2024-58016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58016"
},
{
"name": "CVE-2020-14779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14779"
},
{
"name": "CVE-2025-21903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21903"
},
{
"name": "CVE-2021-41772",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41772"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2023-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1667"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2022-43238",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43238"
},
{
"name": "CVE-2025-3121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3121"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-43680",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43680"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-21761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21761"
},
{
"name": "CVE-2025-46149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46149"
},
{
"name": "CVE-2021-26945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26945"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-46152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46152"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2024-57951",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57951"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-34169",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34169"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2025-21844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21844"
},
{
"name": "CVE-2025-21885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21885"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-21784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21784"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-21681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21681"
},
{
"name": "CVE-2023-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22045"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-21676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21676"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-28463",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28463"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-21726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21726"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2018-3779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3779"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2020-28196",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28196"
},
{
"name": "CVE-2024-27407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27407"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2024-58020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58020"
},
{
"name": "CVE-2025-50091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50091"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2021-31566",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31566"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2021-29923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29923"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2025-21723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21723"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-22049",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22049"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2025-21802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21802"
},
{
"name": "CVE-2022-21341",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21341"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2025-21705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21705"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2022-1355",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1355"
},
{
"name": "CVE-2025-47291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47291"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2025-21721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21721"
},
{
"name": "CVE-2025-21810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21810"
},
{
"name": "CVE-2022-1420",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1420"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2021-24031",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24031"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2025-46153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46153"
},
{
"name": "CVE-2025-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21877"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-5994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5994"
},
{
"name": "CVE-2021-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38115"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2021-31879",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31879"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2024-49887",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49887"
},
{
"name": "CVE-2025-22134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22134"
},
{
"name": "CVE-2021-35578",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35578"
},
{
"name": "CVE-2025-1215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1215"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2021-20309",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20309"
},
{
"name": "CVE-2022-29217",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29217"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38472"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2017-12643",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12643"
},
{
"name": "CVE-2024-57953",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57953"
},
{
"name": "CVE-2020-14583",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14583"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2023-48232",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48232"
},
{
"name": "CVE-2021-26720",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26720"
},
{
"name": "CVE-2025-54801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54801"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-53054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53054"
},
{
"name": "CVE-2025-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21878"
},
{
"name": "CVE-2023-24756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24756"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2021-44716",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44716"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2022-21340",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21340"
},
{
"name": "CVE-2024-47874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47874"
},
{
"name": "CVE-2025-21670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21670"
},
{
"name": "CVE-2025-9403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9403"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2025-21739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21739"
},
{
"name": "CVE-2016-4074",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4074"
},
{
"name": "CVE-2024-0746",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0746"
},
{
"name": "CVE-2025-21775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21775"
},
{
"name": "CVE-2024-12254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12254"
},
{
"name": "CVE-2025-21846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21846"
},
{
"name": "CVE-2022-33099",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33099"
},
{
"name": "CVE-2023-45931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45931"
},
{
"name": "CVE-2025-8114",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8114"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2023-6004",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6004"
},
{
"name": "CVE-2025-32387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32387"
},
{
"name": "CVE-2024-26775",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26775"
},
{
"name": "CVE-2022-25309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25309"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2024-12747",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12747"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-48234",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48234"
},
{
"name": "CVE-2025-55212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55212"
},
{
"name": "CVE-2022-36087",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36087"
},
{
"name": "CVE-2022-32547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32547"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-0351",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0351"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-21293",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21293"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-37752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37752"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2022-1354",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1354"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2025-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21873"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2019-13147",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13147"
},
{
"name": "CVE-2025-50104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50104"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2020-2800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2800"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2018-11655",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11655"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2022-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2928"
},
{
"name": "CVE-2025-21765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21765"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2025-38477",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38477"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-61772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61772"
},
{
"name": "CVE-2025-57803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57803"
},
{
"name": "CVE-2023-46246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46246"
},
{
"name": "CVE-2025-21782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21782"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-30722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30722"
},
{
"name": "CVE-2024-43802",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43802"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2025-21926",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21926"
},
{
"name": "CVE-2022-21282",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21282"
},
{
"name": "CVE-2022-21349",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21349"
},
{
"name": "CVE-2020-29511",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29511"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21742"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2023-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21968"
},
{
"name": "CVE-2022-43243",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43243"
},
{
"name": "CVE-2024-58002",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58002"
},
{
"name": "CVE-2017-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16231"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2025-50101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50101"
},
{
"name": "CVE-2025-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21930"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-5702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5702"
},
{
"name": "CVE-2025-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21870"
},
{
"name": "CVE-2017-9409",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9409"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2025-21892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21892"
},
{
"name": "CVE-2024-58052",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58052"
},
{
"name": "CVE-2025-21944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21944"
},
{
"name": "CVE-2025-21905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21905"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-38352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38352"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2024-54456",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54456"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-21920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21920"
},
{
"name": "CVE-2025-55554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55554"
},
{
"name": "CVE-2024-43168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43168"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-22016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22016"
},
{
"name": "CVE-2025-4207",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4207"
},
{
"name": "CVE-2021-45346",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45346"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2025-21667",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21667"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2024-46901",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46901"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2025-21955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21955"
},
{
"name": "CVE-2025-8677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8677"
},
{
"name": "CVE-2025-21773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21773"
},
{
"name": "CVE-2025-53040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53040"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2025-53906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53906"
},
{
"name": "CVE-2025-27789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27789"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-43167",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43167"
},
{
"name": "CVE-2021-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28861"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2022-21248",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21248"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2021-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40211"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2024-58001",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58001"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2023-21930",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21930"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2025-38618",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38618"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2023-2283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2283"
},
{
"name": "CVE-2020-0499",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-0499"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-21724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21724"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-3136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3136"
},
{
"name": "CVE-2025-55160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55160"
},
{
"name": "CVE-2025-21891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2024-50157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50157"
},
{
"name": "CVE-2022-48703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48703"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2022-1674",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1674"
},
{
"name": "CVE-2024-20918",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20918"
},
{
"name": "CVE-2025-21858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21858"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2022-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30699"
},
{
"name": "CVE-2025-21672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21672"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2023-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2426"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2021-35564",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35564"
},
{
"name": "CVE-2024-57949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57949"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2021-20176",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20176"
},
{
"name": "CVE-2025-21979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21979"
},
{
"name": "CVE-2022-3278",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3278"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2025-21821",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21821"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-55298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55298"
},
{
"name": "CVE-2022-43241",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43241"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2023-52969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52969"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2025-21733",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21733"
},
{
"name": "CVE-2023-22656",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22656"
},
{
"name": "CVE-2025-46551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46551"
},
{
"name": "CVE-2025-43965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43965"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2021-36408",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36408"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-53045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53045"
},
{
"name": "CVE-2023-39327",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39327"
},
{
"name": "CVE-2017-18253",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18253"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-58053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58053"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38350",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38350"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2099"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-6638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6638"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2021-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3610"
},
{
"name": "CVE-2024-58077",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58077"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-21754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21754"
},
{
"name": "CVE-2024-12088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12088"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2021-44717",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44717"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2025-21960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21960"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2020-14155",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14155"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2022-43250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43250"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38473"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2025-52099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52099"
},
{
"name": "CVE-2023-43887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43887"
},
{
"name": "CVE-2025-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21967"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2021-24032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-24032"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2022-21496",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21496"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2020-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2757"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2022-2598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2598"
},
{
"name": "CVE-2020-27829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27829"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21863"
},
{
"name": "CVE-2025-21856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21856"
},
{
"name": "CVE-2025-53053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53053"
},
{
"name": "CVE-2022-2509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2509"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2025-21749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21749"
},
{
"name": "CVE-2017-6839",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6839"
},
{
"name": "CVE-2023-1906",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1906"
},
{
"name": "CVE-2025-40025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40025"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2021-35556",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35556"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2023-47471",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47471"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-1771",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1771"
},
{
"name": "CVE-2025-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21945"
},
{
"name": "CVE-2021-32492",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32492"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2025-55005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55005"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2025-38498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38498"
},
{
"name": "CVE-2025-40015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40015"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2025-21673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21673"
},
{
"name": "CVE-2025-21829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21829"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-57999",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57999"
},
{
"name": "CVE-2018-16645",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16645"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2023-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38039"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2022-21443",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21443"
},
{
"name": "CVE-2025-21969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21969"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-40007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40007"
},
{
"name": "CVE-2024-58072",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58072"
},
{
"name": "CVE-2025-38273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38273"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-55315",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55315"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2025-21722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21722"
},
{
"name": "CVE-2024-50379",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50379"
},
{
"name": "CVE-2021-35560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35560"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2025-21793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21793"
},
{
"name": "CVE-2022-2719",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2719"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2022-45873",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45873"
},
{
"name": "CVE-2023-34151",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34151"
},
{
"name": "CVE-2023-51384",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51384"
},
{
"name": "CVE-2021-43809",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43809"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2015-1606",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1606"
},
{
"name": "CVE-2025-21894",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21894"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2023-3896",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3896"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2024-20945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20945"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2025-21854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21854"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2020-21599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21599"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2025-21759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21759"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2015-20107",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-20107"
},
{
"name": "CVE-2023-39978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39978"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2024-58083",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58083"
},
{
"name": "CVE-2021-20311",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20311"
},
{
"name": "CVE-2024-58055",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58055"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2023-28486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28486"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2024-57993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57993"
},
{
"name": "CVE-2025-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21887"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2021-20241",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20241"
},
{
"name": "CVE-2017-12674",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12674"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-62171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62171"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2020-2756",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2756"
},
{
"name": "CVE-2025-50950",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50950"
},
{
"name": "CVE-2020-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-21605"
},
{
"name": "CVE-2024-54534",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54534"
},
{
"name": "CVE-2023-21967",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21967"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2017-1000476",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000476"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2024-41123",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41123"
},
{
"name": "CVE-2025-6921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6921"
},
{
"name": "CVE-2015-8863",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8863"
},
{
"name": "CVE-2022-21619",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21619"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2018-11656",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11656"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2022-2127",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2127"
},
{
"name": "CVE-2021-25217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25217"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2018-19876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19876"
},
{
"name": "CVE-2025-61780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61780"
},
{
"name": "CVE-2021-20310",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20310"
},
{
"name": "CVE-2021-20245",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20245"
},
{
"name": "CVE-2021-35561",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35561"
},
{
"name": "CVE-2025-21732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21732"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2022-21476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21476"
},
{
"name": "CVE-2023-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22796"
},
{
"name": "CVE-2025-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21875"
},
{
"name": "CVE-2023-0361",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0361"
},
{
"name": "CVE-2025-38204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38204"
},
{
"name": "CVE-2021-40812",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40812"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2025-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22015"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-21832",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21832"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2018-9135",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9135"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-21790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21790"
},
{
"name": "CVE-2024-52316",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52316"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2021-39212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39212"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2024-58014",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58014"
},
{
"name": "CVE-2025-21680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21680"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2017-12433",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12433"
},
{
"name": "CVE-2025-21924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21924"
},
{
"name": "CVE-2021-3574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3574"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-20952",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20952"
},
{
"name": "CVE-2022-21541",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21541"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-58006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58006"
},
{
"name": "CVE-2025-21710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21710"
},
{
"name": "CVE-2022-21360",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21360"
},
{
"name": "CVE-2025-22088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22088"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-25858",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25858"
},
{
"name": "CVE-2022-21296",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21296"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2022-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21540"
},
{
"name": "CVE-2025-21815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21815"
},
{
"name": "CVE-2025-50083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50083"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2017-6836",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6836"
},
{
"name": "CVE-2021-3500",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3500"
},
{
"name": "CVE-2022-25310",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25310"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2021-20251",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20251"
},
{
"name": "CVE-2025-21669",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21669"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2021-33621",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33621"
},
{
"name": "CVE-2025-57807",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-57807"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-21716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21716"
},
{
"name": "CVE-2024-49761",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49761"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-3777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3777"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2024-58080",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58080"
},
{
"name": "CVE-2025-21744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21744"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-31498",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31498"
},
{
"name": "CVE-2022-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30698"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2024-57986",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57986"
},
{
"name": "CVE-2021-37750",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37750"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2021-20244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20244"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-21835",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21835"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-11411",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11411"
},
{
"name": "CVE-2020-14577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14577"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2019-13136",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13136"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2021-36222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36222"
},
{
"name": "CVE-2021-3941",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3941"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2025-21811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21811"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-11226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11226"
}
],
"initial_release_date": "2025-11-06T00:00:00",
"last_revision_date": "2025-11-06T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0969",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-06T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36320",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36320"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36423",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36423"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36364"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36351"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36424",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36424"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36412",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36412"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36388",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36388"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36426",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36426"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36411",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36411"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36357",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36357"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36408",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36408"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36349",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36349"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36414",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36414"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36397",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36397"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36389",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36389"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36398",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36398"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36380",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36380"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-41",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36407"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36362",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36362"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36413",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36413"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36384",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36384"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36379",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36379"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36400",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36400"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36377",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36377"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36368",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36368"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36418",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36418"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36420",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36420"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36391",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36391"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36392",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36392"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36353",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36353"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-14",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36356"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36422",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36422"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36381",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36381"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36421",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36421"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36416",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36416"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-86",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36415"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36403",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36403"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36347",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36347"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36383",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36383"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36410",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36410"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36352",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36352"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36394",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36394"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36354",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36354"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36399",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36399"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36350"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36419",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36419"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-85",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36401"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2022-19",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36365"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36405",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36405"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36367"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36395",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36395"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36387",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36387"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36363",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36363"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36385",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36385"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36409",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36409"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36359"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36348",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36348"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36386",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36386"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36417",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36417"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36425",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36425"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2018-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36366"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36360"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36355",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36355"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-53",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36358"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36396",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36396"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36378",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36378"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36382",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36382"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36404",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36404"
},
{
"published_at": "2025-11-05",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2024-44",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36361"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36402",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36402"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36393",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36393"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36406",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36406"
},
{
"published_at": "2025-11-06",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36390",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36390"
}
]
}
WID-SEC-W-2023-1881
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1881 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1881.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1881 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1881"
},
{
"category": "external",
"summary": "Red Hat Bugzilla \u2013 Bug 2219340 vom 2023-07-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) vom 2023-07-25",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/475"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory vom 2023-07-25",
"url": "https://alas.aws.amazon.com/ALAS-2023-1788.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2157 vom 2023-07-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2157.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2158 vom 2023-07-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2158.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6575 vom 2023-11-07",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6512-1 vom 2023-11-23",
"url": "https://ubuntu.com/security/notices/USN-6512-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5567 vom 2023-11-27",
"url": "https://lists.debian.org/debian-security-announce/2023/msg00263.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3758 vom 2024-03-11",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-03-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:56:11.978+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1881",
"initial_release_date": "2023-07-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-07-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-03-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source libTIFF",
"product": {
"name": "Open Source libTIFF",
"product_id": "T028902",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-3576",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in libTIFF. Dieser Fehler besteht aufgrund eines Speicherlecks in tiffcrop.c. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"67646",
"T000126",
"T028902",
"398363"
]
},
"release_date": "2023-07-25T22:00:00.000+00:00",
"title": "CVE-2023-3576"
}
]
}
wid-sec-w-2023-1881
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Zustand zu verursachen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-1881 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-1881.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-1881 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-1881"
},
{
"category": "external",
"summary": "Red Hat Bugzilla \u2013 Bug 2219340 vom 2023-07-25",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"category": "external",
"summary": "Proof of Concept (PoC) vom 2023-07-25",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/475"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory vom 2023-07-25",
"url": "https://alas.aws.amazon.com/ALAS-2023-1788.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2157 vom 2023-07-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2157.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2158 vom 2023-07-26",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2158.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:6575 vom 2023-11-07",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-6512-1 vom 2023-11-23",
"url": "https://ubuntu.com/security/notices/USN-6512-1"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-5567 vom 2023-11-27",
"url": "https://lists.debian.org/debian-security-announce/2023/msg00263.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-3758 vom 2024-03-11",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-03-11T23:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:56:11.978+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-1881",
"initial_release_date": "2023-07-25T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-07-25T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-11-07T23:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-11-23T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2023-11-26T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2024-03-11T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Debian aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source libTIFF",
"product": {
"name": "Open Source libTIFF",
"product_id": "T028902",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-3576",
"notes": [
{
"category": "description",
"text": "Es besteht eine Schwachstelle in libTIFF. Dieser Fehler besteht aufgrund eines Speicherlecks in tiffcrop.c. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial-of-Service-Zustand zu verursachen."
}
],
"product_status": {
"known_affected": [
"2951",
"67646",
"T000126",
"T028902",
"398363"
]
},
"release_date": "2023-07-25T22:00:00.000+00:00",
"title": "CVE-2023-3576"
}
]
}
suse-su-2023:4371-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\n- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff\n (bsc#1213589).\n- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).\n- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).\n- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).\n- CVE-2023-26966: Fixed an out of bounds read when transforming a\n little-endian file to a big-endian output (bsc#1212881)\n- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3\n files (bsc#1213274).\n- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer\n arithmetic on a NULL pointer (bsc#1212888).\n- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file\n in an inaccessible path (bsc#1212535).\n- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4371,SUSE-SLE-SDK-12-SP5-2023-4371,SUSE-SLE-SERVER-12-SP5-2023-4371",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4371-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4371-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234371-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4371-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/016999.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212535",
"url": "https://bugzilla.suse.com/1212535"
},
{
"category": "self",
"summary": "SUSE Bug 1212881",
"url": "https://bugzilla.suse.com/1212881"
},
{
"category": "self",
"summary": "SUSE Bug 1212883",
"url": "https://bugzilla.suse.com/1212883"
},
{
"category": "self",
"summary": "SUSE Bug 1212888",
"url": "https://bugzilla.suse.com/1212888"
},
{
"category": "self",
"summary": "SUSE Bug 1213273",
"url": "https://bugzilla.suse.com/1213273"
},
{
"category": "self",
"summary": "SUSE Bug 1213274",
"url": "https://bugzilla.suse.com/1213274"
},
{
"category": "self",
"summary": "SUSE Bug 1213589",
"url": "https://bugzilla.suse.com/1213589"
},
{
"category": "self",
"summary": "SUSE Bug 1213590",
"url": "https://bugzilla.suse.com/1213590"
},
{
"category": "self",
"summary": "SUSE Bug 1214574",
"url": "https://bugzilla.suse.com/1214574"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-18768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-18768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25433 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25433/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26966 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2908 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3316 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3576 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3618 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38288 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38289/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2023-11-06T08:52:20Z",
"generator": {
"date": "2023-11-06T08:52:20Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4371-1",
"initial_release_date": "2023-11-06T08:52:20Z",
"revision_history": [
{
"date": "2023-11-06T08:52:20Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.aarch64",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.aarch64",
"product_id": "libtiff-devel-4.0.9-44.71.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.aarch64",
"product": {
"name": "libtiff5-4.0.9-44.71.1.aarch64",
"product_id": "libtiff5-4.0.9-44.71.1.aarch64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.aarch64",
"product": {
"name": "tiff-4.0.9-44.71.1.aarch64",
"product_id": "tiff-4.0.9-44.71.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product": {
"name": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product_id": "libtiff-devel-64bit-4.0.9-44.71.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product": {
"name": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32",
"product_id": "libtiff5-64bit-4.0.9-44.71.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.i586",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.i586",
"product_id": "libtiff-devel-4.0.9-44.71.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.i586",
"product": {
"name": "libtiff5-4.0.9-44.71.1.i586",
"product_id": "libtiff5-4.0.9-44.71.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.i586",
"product": {
"name": "tiff-4.0.9-44.71.1.i586",
"product_id": "tiff-4.0.9-44.71.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"product_id": "libtiff-devel-4.0.9-44.71.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.ppc64le",
"product": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le",
"product_id": "libtiff5-4.0.9-44.71.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.ppc64le",
"product": {
"name": "tiff-4.0.9-44.71.1.ppc64le",
"product_id": "tiff-4.0.9-44.71.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.s390",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.s390",
"product_id": "libtiff-devel-4.0.9-44.71.1.s390"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.s390",
"product": {
"name": "libtiff5-4.0.9-44.71.1.s390",
"product_id": "libtiff5-4.0.9-44.71.1.s390"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.s390",
"product": {
"name": "tiff-4.0.9-44.71.1.s390",
"product_id": "tiff-4.0.9-44.71.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.s390x",
"product_id": "libtiff-devel-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff-devel-32bit-4.0.9-44.71.1.s390x",
"product_id": "libtiff-devel-32bit-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff5-4.0.9-44.71.1.s390x",
"product_id": "libtiff5-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"product": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"product_id": "libtiff5-32bit-4.0.9-44.71.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.s390x",
"product": {
"name": "tiff-4.0.9-44.71.1.s390x",
"product_id": "tiff-4.0.9-44.71.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff-devel-4.0.9-44.71.1.x86_64",
"product_id": "libtiff-devel-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64",
"product_id": "libtiff-devel-32bit-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff5-4.0.9-44.71.1.x86_64",
"product_id": "libtiff5-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"product": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"product_id": "libtiff5-32bit-4.0.9-44.71.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-44.71.1.x86_64",
"product": {
"name": "tiff-4.0.9-44.71.1.x86_64",
"product_id": "tiff-4.0.9-44.71.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-sdk:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:12:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Software Development Kit 12 SP5",
"product_id": "SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Software Development Kit 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64"
},
"product_reference": "tiff-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le"
},
"product_reference": "tiff-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x"
},
"product_reference": "tiff-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5",
"product_id": "SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64"
},
"product_reference": "tiff-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.aarch64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64"
},
"product_reference": "tiff-4.0.9-44.71.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le"
},
"product_reference": "tiff-4.0.9-44.71.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x"
},
"product_reference": "tiff-4.0.9-44.71.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-44.71.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 12 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64"
},
"product_reference": "tiff-4.0.9-44.71.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-18768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-18768"
}
],
"notes": [
{
"category": "general",
"text": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-18768",
"url": "https://www.suse.com/security/cve/CVE-2020-18768"
},
{
"category": "external",
"summary": "SUSE Bug 1214574 for CVE-2020-18768",
"url": "https://bugzilla.suse.com/1214574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2020-18768"
},
{
"cve": "CVE-2023-25433",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25433"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25433",
"url": "https://www.suse.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "SUSE Bug 1212883 for CVE-2023-25433",
"url": "https://bugzilla.suse.com/1212883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-26966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26966"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26966",
"url": "https://www.suse.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "SUSE Bug 1212881 for CVE-2023-26966",
"url": "https://bugzilla.suse.com/1212881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-26966"
},
{
"cve": "CVE-2023-2908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2908"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2908",
"url": "https://www.suse.com/security/cve/CVE-2023-2908"
},
{
"category": "external",
"summary": "SUSE Bug 1212888 for CVE-2023-2908",
"url": "https://bugzilla.suse.com/1212888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-2908"
},
{
"cve": "CVE-2023-3316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3316"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3316",
"url": "https://www.suse.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "SUSE Bug 1212535 for CVE-2023-3316",
"url": "https://bugzilla.suse.com/1212535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-3316"
},
{
"cve": "CVE-2023-3576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3576"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3576",
"url": "https://www.suse.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "SUSE Bug 1213273 for CVE-2023-3576",
"url": "https://bugzilla.suse.com/1213273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-3576"
},
{
"cve": "CVE-2023-3618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3618"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3618",
"url": "https://www.suse.com/security/cve/CVE-2023-3618"
},
{
"category": "external",
"summary": "SUSE Bug 1213274 for CVE-2023-3618",
"url": "https://bugzilla.suse.com/1213274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "moderate"
}
],
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-38288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38288"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38288",
"url": "https://www.suse.com/security/cve/CVE-2023-38288"
},
{
"category": "external",
"summary": "SUSE Bug 1213590 for CVE-2023-38288",
"url": "https://bugzilla.suse.com/1213590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-38288"
},
{
"cve": "CVE-2023-38289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38289"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38289",
"url": "https://www.suse.com/security/cve/CVE-2023-38289"
},
{
"category": "external",
"summary": "SUSE Bug 1213589 for CVE-2023-38289",
"url": "https://bugzilla.suse.com/1213589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-32bit-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:libtiff5-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Server for SAP Applications 12 SP5:tiff-4.0.9-44.71.1.x86_64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.aarch64",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.ppc64le",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.s390x",
"SUSE Linux Enterprise Software Development Kit 12 SP5:libtiff-devel-4.0.9-44.71.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:52:20Z",
"details": "low"
}
],
"title": "CVE-2023-38289"
}
]
}
suse-su-2023:4370-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for tiff",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for tiff fixes the following issues:\n\n- CVE-2023-38289: Fixed a NULL pointer dereference in raw2tiff\n (bsc#1213589).\n- CVE-2023-38288: Fixed an integer overflow in raw2tiff (bsc#1213590).\n- CVE-2023-3576: Fixed a memory leak in tiffcrop (bsc#1213273).\n- CVE-2020-18768: Fixed an out of bounds read in tiffcp (bsc#1214574).\n- CVE-2023-26966: Fixed an out of bounds read when transforming a\n little-endian file to a big-endian output (bsc#1212881)\n- CVE-2023-3618: Fixed a NULL pointer dereference while encoding FAX3\n files (bsc#1213274).\n- CVE-2023-2908: Fixed an undefined behavior issue when doing pointer\n arithmetic on a NULL pointer (bsc#1212888).\n- CVE-2023-3316: Fixed a NULL pointer dereference while opening a file\n in an inaccessible path (bsc#1212535).\n- CVE-2023-25433: Fixed a buffer overflow in tiffcrop (bsc#1212883).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2023-4370,SUSE-SLE-Micro-5.3-2023-4370,SUSE-SLE-Micro-5.4-2023-4370,SUSE-SLE-Micro-5.5-2023-4370,SUSE-SLE-Module-Basesystem-15-SP4-2023-4370,SUSE-SLE-Module-Basesystem-15-SP5-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP4-2023-4370,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2023-4370,SUSE-SUSE-MicroOS-5.2-2023-4370,openSUSE-Leap-Micro-5.3-2023-4370,openSUSE-Leap-Micro-5.4-2023-4370,openSUSE-SLE-15.4-2023-4370,openSUSE-SLE-15.5-2023-4370",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2023_4370-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2023:4370-1",
"url": "https://www.suse.com/support/update/announcement/2023/suse-su-20234370-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2023:4370-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2023-November/017000.html"
},
{
"category": "self",
"summary": "SUSE Bug 1212535",
"url": "https://bugzilla.suse.com/1212535"
},
{
"category": "self",
"summary": "SUSE Bug 1212881",
"url": "https://bugzilla.suse.com/1212881"
},
{
"category": "self",
"summary": "SUSE Bug 1212883",
"url": "https://bugzilla.suse.com/1212883"
},
{
"category": "self",
"summary": "SUSE Bug 1212888",
"url": "https://bugzilla.suse.com/1212888"
},
{
"category": "self",
"summary": "SUSE Bug 1213273",
"url": "https://bugzilla.suse.com/1213273"
},
{
"category": "self",
"summary": "SUSE Bug 1213274",
"url": "https://bugzilla.suse.com/1213274"
},
{
"category": "self",
"summary": "SUSE Bug 1213589",
"url": "https://bugzilla.suse.com/1213589"
},
{
"category": "self",
"summary": "SUSE Bug 1213590",
"url": "https://bugzilla.suse.com/1213590"
},
{
"category": "self",
"summary": "SUSE Bug 1214574",
"url": "https://bugzilla.suse.com/1214574"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2020-18768 page",
"url": "https://www.suse.com/security/cve/CVE-2020-18768/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-25433 page",
"url": "https://www.suse.com/security/cve/CVE-2023-25433/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-26966 page",
"url": "https://www.suse.com/security/cve/CVE-2023-26966/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2908 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2908/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3316 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3316/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3576 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3576/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-3618 page",
"url": "https://www.suse.com/security/cve/CVE-2023-3618/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38288 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38288/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-38289 page",
"url": "https://www.suse.com/security/cve/CVE-2023-38289/"
}
],
"title": "Security update for tiff",
"tracking": {
"current_release_date": "2023-11-06T08:51:27Z",
"generator": {
"date": "2023-11-06T08:51:27Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2023:4370-1",
"initial_release_date": "2023-11-06T08:51:27Z",
"revision_history": [
{
"date": "2023-11-06T08:51:27Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"product_id": "libtiff5-4.0.9-150000.45.32.1.aarch64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.aarch64",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64",
"product_id": "tiff-4.0.9-150000.45.32.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product": {
"name": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product_id": "libtiff-devel-64bit-4.0.9-150000.45.32.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product": {
"name": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32",
"product_id": "libtiff5-64bit-4.0.9-150000.45.32.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.i586",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.i586",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.i586"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.i586",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.i586",
"product_id": "libtiff5-4.0.9-150000.45.32.1.i586"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.i586",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.i586",
"product_id": "tiff-4.0.9-150000.45.32.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"product_id": "libtiff5-4.0.9-150000.45.32.1.ppc64le"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.ppc64le",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le",
"product_id": "tiff-4.0.9-150000.45.32.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.s390x"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x",
"product_id": "libtiff5-4.0.9-150000.45.32.1.s390x"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.s390x",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.s390x",
"product_id": "tiff-4.0.9-150000.45.32.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff-devel-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff5-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"product_id": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
}
},
{
"category": "product_version",
"name": "tiff-4.0.9-150000.45.32.1.x86_64",
"product": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64",
"product_id": "tiff-4.0.9-150000.45.32.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.4",
"product": {
"name": "openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.4",
"product_id": "openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "tiff-4.0.9-150000.45.32.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64"
},
"product_reference": "tiff-4.0.9-150000.45.32.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2020-18768",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2020-18768"
}
],
"notes": [
{
"category": "general",
"text": "There exists one heap buffer overflow in _TIFFmemcpy in tif_unix.c in libtiff 4.0.10, which allows an attacker to cause a denial-of-service through a crafted tiff file.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2020-18768",
"url": "https://www.suse.com/security/cve/CVE-2020-18768"
},
{
"category": "external",
"summary": "SUSE Bug 1214574 for CVE-2020-18768",
"url": "https://bugzilla.suse.com/1214574"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2020-18768"
},
{
"cve": "CVE-2023-25433",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-25433"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow via /libtiff/tools/tiffcrop.c:8499. Incorrect updating of buffer size after rotateImage() in tiffcrop cause heap-buffer-overflow and SEGV.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-25433",
"url": "https://www.suse.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "SUSE Bug 1212883 for CVE-2023-25433",
"url": "https://bugzilla.suse.com/1212883"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-26966",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-26966"
}
],
"notes": [
{
"category": "general",
"text": "libtiff 4.5.0 is vulnerable to Buffer Overflow in uv_encode() when libtiff reads a corrupted little-endian TIFF file and specifies the output to be big-endian.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-26966",
"url": "https://www.suse.com/security/cve/CVE-2023-26966"
},
{
"category": "external",
"summary": "SUSE Bug 1212881 for CVE-2023-26966",
"url": "https://bugzilla.suse.com/1212881"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-26966"
},
{
"cve": "CVE-2023-2908",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2908"
}
],
"notes": [
{
"category": "general",
"text": "A null pointer dereference issue was found in Libtiff\u0027s tif_dir.c file. This issue may allow an attacker to pass a crafted TIFF image file to the tiffcp utility which triggers a runtime error that causes undefined behavior. This will result in an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2908",
"url": "https://www.suse.com/security/cve/CVE-2023-2908"
},
{
"category": "external",
"summary": "SUSE Bug 1212888 for CVE-2023-2908",
"url": "https://bugzilla.suse.com/1212888"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-2908"
},
{
"cve": "CVE-2023-3316",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3316"
}
],
"notes": [
{
"category": "general",
"text": "A NULL pointer dereference in TIFFClose() is caused by a failure to open an output file (non-existent path or a path that requires permissions like /dev/null) while specifying zones.\n\n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3316",
"url": "https://www.suse.com/security/cve/CVE-2023-3316"
},
{
"category": "external",
"summary": "SUSE Bug 1212535 for CVE-2023-3316",
"url": "https://bugzilla.suse.com/1212535"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-3316"
},
{
"cve": "CVE-2023-3576",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3576"
}
],
"notes": [
{
"category": "general",
"text": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3576",
"url": "https://www.suse.com/security/cve/CVE-2023-3576"
},
{
"category": "external",
"summary": "SUSE Bug 1213273 for CVE-2023-3576",
"url": "https://bugzilla.suse.com/1213273"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-3576"
},
{
"cve": "CVE-2023-3618",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-3618"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in libtiff. A specially crafted tiff file can lead to a segmentation fault due to a buffer overflow in the Fax3Encode function in libtiff/tif_fax3.c, resulting in a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-3618",
"url": "https://www.suse.com/security/cve/CVE-2023-3618"
},
{
"category": "external",
"summary": "SUSE Bug 1213274 for CVE-2023-3618",
"url": "https://bugzilla.suse.com/1213274"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "moderate"
}
],
"title": "CVE-2023-3618"
},
{
"cve": "CVE-2023-38288",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38288"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38288",
"url": "https://www.suse.com/security/cve/CVE-2023-38288"
},
{
"category": "external",
"summary": "SUSE Bug 1213590 for CVE-2023-38288",
"url": "https://bugzilla.suse.com/1213590"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-38288"
},
{
"cve": "CVE-2023-38289",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-38289"
}
],
"notes": [
{
"category": "general",
"text": "** REJECT ** Not a Security Issue.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-38289",
"url": "https://www.suse.com/security/cve/CVE-2023-38289"
},
{
"category": "external",
"summary": "SUSE Bug 1213589 for CVE-2023-38289",
"url": "https://bugzilla.suse.com/1213589"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.3,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP4:tiff-4.0.9-150000.45.32.1.x86_64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.aarch64",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.ppc64le",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.s390x",
"SUSE Linux Enterprise Module for Package Hub 15 SP5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.4:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff-devel-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-32bit-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.ppc64le",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap 15.5:tiff-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.3:libtiff5-4.0.9-150000.45.32.1.x86_64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.aarch64",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.s390x",
"openSUSE Leap Micro 5.4:libtiff5-4.0.9-150000.45.32.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2023-11-06T08:51:27Z",
"details": "low"
}
],
"title": "CVE-2023-38289"
}
]
}
ghsa-qfgr-f5j7-2xxf
Vulnerability from github
A memory leak flaw was found in Libtiff's tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.
{
"affected": [],
"aliases": [
"CVE-2023-3576"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-401"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-10-04T19:15:10Z",
"severity": "MODERATE"
},
"details": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"id": "GHSA-qfgr-f5j7-2xxf",
"modified": "2024-03-11T15:31:23Z",
"published": "2023-10-04T21:30:22Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-3576"
},
{
"type": "WEB",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"type": "WEB",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
gsd-2023-3576
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2023-3576",
"id": "GSD-2023-3576"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-3576"
],
"details": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service.",
"id": "GSD-2023-3576",
"modified": "2023-12-13T01:20:54.469022Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-3576",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Red Hat Enterprise Linux 9",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected",
"versions": [
{
"lessThan": "*",
"status": "unaffected",
"version": "0:4.4.0-10.el9",
"versionType": "rpm"
}
]
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 6",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 7",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "unknown"
}
}
]
}
},
{
"product_name": "Red Hat Enterprise Linux 8",
"version": {
"version_data": [
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
},
{
"version_value": "not down converted",
"x_cve_json_5_version_data": {
"defaultStatus": "affected"
}
}
]
}
}
]
},
"vendor_name": "Red Hat"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service."
}
]
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-119",
"lang": "eng",
"value": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://access.redhat.com/errata/RHSA-2023:6575",
"refsource": "MISC",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2023-3576",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"name": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html",
"refsource": "MISC",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
]
}
},
"nvd.nist.gov": {
"cve": {
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4133F7CE-3597-4F03-B3E4-3EA0BB5ADE64",
"versionEndExcluding": "4.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FEADDA-2AEE-4F65-9401-971B585664A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla de p\u00e9rdida de memoria en la utilidad tiffcrop de Libatiff. Este problema se produce cuando tiffcrop opera en un archivo de imagen TIFF, lo que permite a un atacante pasar un archivo de imagen TIFF manipulado a la utilidad tiffcrop, lo que provoca este problema de p\u00e9rdida de memoria, un bloqueo de la aplicaci\u00f3n y, finalmente, una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2023-3576",
"lastModified": "2024-03-11T13:15:52.550",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
},
"published": "2023-10-04T19:15:10.340",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"source": "secalert@redhat.com",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
}
]
}
}
}
}
fkie_cve-2023-3576
Vulnerability from fkie_nvd
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/errata/RHSA-2023:6575 | ||
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-3576 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2219340 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/errata/RHSA-2023:6575 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-3576 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2219340 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html |
| Vendor | Product | Version | |
|---|---|---|---|
| libtiff | libtiff | * | |
| fedoraproject | fedora | - | |
| redhat | enterprise_linux | 8.0 | |
| redhat | enterprise_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:*:*:*:*:*:*:*:*",
"matchCriteriaId": "4133F7CE-3597-4F03-B3E4-3EA0BB5ADE64",
"versionEndExcluding": "4.5.1",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D3FEADDA-2AEE-4F65-9401-971B585664A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F4CFF558-3C47-480D-A2F0-BABF26042943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:redhat:enterprise_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "7F6FB57C-2BC7-487C-96DD-132683AEB35D",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A memory leak flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs when tiffcrop operates on a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes this memory leak issue, resulting an application crash, eventually leading to a denial of service."
},
{
"lang": "es",
"value": "Se encontr\u00f3 una falla de p\u00e9rdida de memoria en la utilidad tiffcrop de Libatiff. Este problema se produce cuando tiffcrop opera en un archivo de imagen TIFF, lo que permite a un atacante pasar un archivo de imagen TIFF manipulado a la utilidad tiffcrop, lo que provoca este problema de p\u00e9rdida de memoria, un bloqueo de la aplicaci\u00f3n y, finalmente, una denegaci\u00f3n de servicio."
}
],
"id": "CVE-2023-3576",
"lastModified": "2024-11-21T08:17:35.157",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-10-04T19:15:10.340",
"references": [
{
"source": "secalert@redhat.com",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://access.redhat.com/errata/RHSA-2023:6575"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-3576"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2219340"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://lists.debian.org/debian-lts-announce/2024/03/msg00011.html"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-401"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.