Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-15209 (GCVE-0-2018-15209)
Vulnerability from cvelistv5
- n/a
| URL | Tags | ||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T09:46:25.380Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "DSA-4349",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"name": "105092",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/105092"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2018-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-12-01T10:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "DSA-4349",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"name": "105092",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/105092"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-15209",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4349",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2808",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"name": "105092",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105092"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2018-15209",
"datePublished": "2018-08-08T04:00:00",
"dateReserved": "2018-08-07T00:00:00",
"dateUpdated": "2024-08-05T09:46:25.380Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2018-15209\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2018-08-08T04:29:00.477\",\"lastModified\":\"2024-11-21T03:50:31.700\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.\"},{\"lang\":\"es\",\"value\":\"ChopUpSingleUncompressedStrip en tif_dirread.c en LibTIFF 4.0.9 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer y ca\u00edda de aplicaci\u00f3n basada en memoria din\u00e1mica o heap) o, probablemente, provocar cualquier otro tipo de problema mediante un archivo TIFF manipulado, tal y como queda demostrado con tiff2pdf.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":8.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"27374BA0-7A61-4BDC-9F92-C09E99A9AB81\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEECE5FC-CACF-4496-A3E7-164736409252\"}]}]}],\"references\":[{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2808\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105092\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4349\",\"source\":\"cve@mitre.org\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://bugzilla.maptools.org/show_bug.cgi?id=2808\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/105092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://www.debian.org/security/2018/dsa-4349\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}"
}
}
gsd-2018-15209
Vulnerability from gsd
{
"GSD": {
"alias": "CVE-2018-15209",
"description": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"id": "GSD-2018-15209",
"references": [
"https://www.suse.com/security/cve/CVE-2018-15209.html",
"https://www.debian.org/security/2018/dsa-4349"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-15209"
],
"details": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"id": "GSD-2018-15209",
"modified": "2023-12-13T01:22:23.718210Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-15209",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "DSA-4349",
"refsource": "DEBIAN",
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2808",
"refsource": "MISC",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"name": "105092",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/105092"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2018-15209"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://bugzilla.maptools.org/show_bug.cgi?id=2808",
"refsource": "MISC",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"name": "105092",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/105092"
},
{
"name": "DSA-4349",
"refsource": "DEBIAN",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4349"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": true
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9
}
},
"lastModifiedDate": "2020-08-24T17:37Z",
"publishedDate": "2018-08-08T04:29Z"
}
}
}
rhsa-2024:5079
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209)\n\n* libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433)\n\n* libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228)\n\n* libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5079",
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5079.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2025-10-09T18:09:12+00:00",
"generator": {
"date": "2025-10-09T18:09:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:5079",
"initial_release_date": "2024-08-07T11:17:09+00:00",
"revision_history": [
{
"date": "2024-08-07T11:17:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-07T11:17:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:09:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product_id": "libtiff-0:4.0.9-32.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1614051"
}
],
"notes": [
{
"category": "description",
"text": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a moderate severity due to a series of factors. Firstly, the attack vector necessary to successfully exploit this flaw is local, given that the attacker must rely on user interaction (by tricking or fooling them into opening a maliciously-crafted TIFF file). Secondly, the CIA impact of this vulnerability should be assumed to be Low for all three vectors, due to to the fact that a successful crash would only impact the LibTIFF application itself, the application does not inherently have access to nor handle sensitive or confidential information, and since it causes a DoS due to heap-based buffer overflow there is little indication that this will modify or alter data.\n\nThis issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 5, 6, and 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15209"
},
{
"category": "external",
"summary": "RHBZ#1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209"
}
],
"release_date": "2018-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c"
},
{
"cve": "CVE-2023-6228",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240995"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a low severity due to the fact that a potential crash in an application using the vulnerable tiffcp utility will most likely lead to temporary disruptions in availability; there are no indications that this vulnerability will lead to long-term or persistent downtime resulting from a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6228"
},
{
"category": "external",
"summary": "RHBZ#2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228"
}
],
"release_date": "2023-09-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c"
},
{
"cve": "CVE-2023-25433",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the processCropSelections function in tools/tiffcrop.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "RHBZ#2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433"
}
],
"release_date": "2023-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c"
},
{
"cve": "CVE-2023-52356",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2023-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2251344"
}
],
"notes": [
{
"category": "description",
"text": "A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw allows an attacker to potentially cause a denial of service attack by crashing a program, but the impact is minimal.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52356"
},
{
"category": "external",
"summary": "RHBZ#2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/issues/622",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/622"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546"
}
],
"release_date": "2023-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service"
}
]
}
rhsa-2024_5079
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209)\n\n* libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433)\n\n* libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228)\n\n* libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5079",
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5079.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2024-12-18T15:18:04+00:00",
"generator": {
"date": "2024-12-18T15:18:04+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.3"
}
},
"id": "RHSA-2024:5079",
"initial_release_date": "2024-08-07T11:17:09+00:00",
"revision_history": [
{
"date": "2024-08-07T11:17:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-07T11:17:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-12-18T15:18:04+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product_id": "libtiff-0:4.0.9-32.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1614051"
}
],
"notes": [
{
"category": "description",
"text": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a moderate severity due to a series of factors. Firstly, the attack vector necessary to successfully exploit this flaw is local, given that the attacker must rely on user interaction (by tricking or fooling them into opening a maliciously-crafted TIFF file). Secondly, the CIA impact of this vulnerability should be assumed to be Low for all three vectors, due to to the fact that a successful crash would only impact the LibTIFF application itself, the application does not inherently have access to nor handle sensitive or confidential information, and since it causes a DoS due to heap-based buffer overflow there is little indication that this will modify or alter data.\n\nThis issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 5, 6, and 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15209"
},
{
"category": "external",
"summary": "RHBZ#1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209"
}
],
"release_date": "2018-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c"
},
{
"cve": "CVE-2023-6228",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240995"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a low severity due to the fact that a potential crash in an application using the vulnerable tiffcp utility will most likely lead to temporary disruptions in availability; there are no indications that this vulnerability will lead to long-term or persistent downtime resulting from a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6228"
},
{
"category": "external",
"summary": "RHBZ#2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228"
}
],
"release_date": "2023-09-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c"
},
{
"cve": "CVE-2023-25433",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the processCropSelections function in tools/tiffcrop.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "RHBZ#2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433"
}
],
"release_date": "2023-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c"
},
{
"cve": "CVE-2023-52356",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2023-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2251344"
}
],
"notes": [
{
"category": "description",
"text": "A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw allows an attacker to potentially cause a denial of service attack by crashing a program, but the impact is minimal.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52356"
},
{
"category": "external",
"summary": "RHBZ#2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/issues/622",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/622"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546"
}
],
"release_date": "2023-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service"
}
]
}
RHSA-2024:5079
Vulnerability from csaf_redhat
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 8.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c (CVE-2018-15209)\n\n* libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c (CVE-2023-25433)\n\n* libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c (CVE-2023-6228)\n\n* libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service (CVE-2023-52356)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2024:5079",
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2024/rhsa-2024_5079.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2025-10-09T18:09:12+00:00",
"generator": {
"date": "2025-10-09T18:09:12+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.9"
}
},
"id": "RHSA-2024:5079",
"initial_release_date": "2024-08-07T11:17:09+00:00",
"revision_history": [
{
"date": "2024-08-07T11:17:09+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2024-08-07T11:17:09+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-10-09T18:09:12+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:8::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.src",
"product_id": "libtiff-0:4.0.9-32.el8_10.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.0.9-32.el8_10?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_id": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.0.9-32.el8_10?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 8)",
"product_id": "AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "AppStream-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.src as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.src",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 8)",
"product_id": "CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"relates_to_product_reference": "CRB-8.10.0.Z.MAIN.EUS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2018-08-08T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "1614051"
}
],
"notes": [
{
"category": "description",
"text": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a moderate severity due to a series of factors. Firstly, the attack vector necessary to successfully exploit this flaw is local, given that the attacker must rely on user interaction (by tricking or fooling them into opening a maliciously-crafted TIFF file). Secondly, the CIA impact of this vulnerability should be assumed to be Low for all three vectors, due to to the fact that a successful crash would only impact the LibTIFF application itself, the application does not inherently have access to nor handle sensitive or confidential information, and since it causes a DoS due to heap-based buffer overflow there is little indication that this will modify or alter data.\n\nThis issue did not affect the versions of libtiff as shipped with Red Hat Enterprise Linux 5, 6, and 7.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2018-15209"
},
{
"category": "external",
"summary": "RHBZ#1614051",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=1614051"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209"
}
],
"release_date": "2018-08-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c"
},
{
"cve": "CVE-2023-6228",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-09-27T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2240995"
}
],
"notes": [
{
"category": "description",
"text": "An issue was found in the tiffcp utility distributed by the libtiff package where a crafted TIFF file on processing may cause a heap-based buffer overflow leads to an application crash.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat has determined that this vulnerability has a low severity due to the fact that a potential crash in an application using the vulnerable tiffcp utility will most likely lead to temporary disruptions in availability; there are no indications that this vulnerability will lead to long-term or persistent downtime resulting from a crash.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-6228"
},
{
"category": "external",
"summary": "RHBZ#2240995",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2240995"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-6228"
}
],
"release_date": "2023-09-07T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Low"
}
],
"title": "libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c"
},
{
"cve": "CVE-2023-25433",
"cwe": {
"id": "CWE-120",
"name": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)"
},
"discovery_date": "2023-06-29T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2218744"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tiffcrop, a program distributed by the libtiff package. A specially crafted tiff file can lead to a heap-based buffer overflow in the processCropSelections function in tools/tiffcrop.c, resulting in a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-25433"
},
{
"category": "external",
"summary": "RHBZ#2218744",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2218744"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-25433"
}
],
"release_date": "2023-01-27T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c"
},
{
"cve": "CVE-2023-52356",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2023-11-24T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2251344"
}
],
"notes": [
{
"category": "description",
"text": "A segment fault (SEGV) flaw was found in libtiff that could be triggered by passing a crafted tiff file to the TIFFReadRGBATileExt() API. This flaw allows a remote attacker to cause a heap-buffer overflow, leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "The flaw allows an attacker to potentially cause a denial of service attack by crashing a program, but the impact is minimal.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-52356"
},
{
"category": "external",
"summary": "RHBZ#2251344",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2251344"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-52356"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/issues/622",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/622"
},
{
"category": "external",
"summary": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546",
"url": "https://gitlab.com/libtiff/libtiff/-/merge_requests/546"
}
],
"release_date": "2023-11-03T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2024-08-07T11:17:09+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258",
"product_ids": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"AppStream-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.src",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debuginfo-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-debugsource-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-devel-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-0:4.0.9-32.el8_10.x86_64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.aarch64",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.i686",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.ppc64le",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.s390x",
"CRB-8.10.0.Z.MAIN.EUS:libtiff-tools-debuginfo-0:4.0.9-32.el8_10.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service"
}
]
}
CERTFR-2024-AVI-1103
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2014-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2015-7182",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
},
{
"name": "CVE-2015-7181",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
},
{
"name": "CVE-2015-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
},
{
"name": "CVE-2016-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
},
{
"name": "CVE-2017-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2018-20677",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2018-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2024-34102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2013-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
},
{
"name": "CVE-2014-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
},
{
"name": "CVE-2017-11613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
},
{
"name": "CVE-2017-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
},
{
"name": "CVE-2017-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
},
{
"name": "CVE-2017-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
},
{
"name": "CVE-2017-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
},
{
"name": "CVE-2017-12627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
},
{
"name": "CVE-2017-18013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
},
{
"name": "CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2018-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
},
{
"name": "CVE-2018-17000",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
},
{
"name": "CVE-2018-17100",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
},
{
"name": "CVE-2018-17101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
},
{
"name": "CVE-2018-19210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
},
{
"name": "CVE-2018-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
},
{
"name": "CVE-2018-7456",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
},
{
"name": "CVE-2019-10255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
},
{
"name": "CVE-2019-14973",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
},
{
"name": "CVE-2019-17546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
},
{
"name": "CVE-2019-6128",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
},
{
"name": "CVE-2020-15110",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
},
{
"name": "CVE-2020-18768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
},
{
"name": "CVE-2020-19131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
},
{
"name": "CVE-2020-19144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
},
{
"name": "CVE-2020-26261",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
},
{
"name": "CVE-2020-35521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
},
{
"name": "CVE-2020-35522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
},
{
"name": "CVE-2020-35523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
},
{
"name": "CVE-2020-35524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
},
{
"name": "CVE-2020-36191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
},
{
"name": "CVE-2021-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2022-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2023-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-38288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
},
{
"name": "CVE-2023-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2023-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
},
{
"name": "CVE-2023-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
},
{
"name": "CVE-2023-4759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2023-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2023-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
},
{
"name": "CVE-2024-25016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
},
{
"name": "CVE-2024-29896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2024-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
},
{
"name": "CVE-2024-41752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
},
{
"name": "CVE-2024-45082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
}
],
"initial_release_date": "2024-12-20T00:00:00",
"last_revision_date": "2024-12-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1103",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
"url": "https://www.ibm.com/support/pages/node/7177142"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
"url": "https://www.ibm.com/support/pages/node/7177223"
},
{
"published_at": "2024-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
"url": "https://www.ibm.com/support/pages/node/7179044"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
"url": "https://www.ibm.com/support/pages/node/7179156"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
"url": "https://www.ibm.com/support/pages/node/7179166"
},
{
"published_at": "2024-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
"url": "https://www.ibm.com/support/pages/node/7178835"
}
]
}
CERTFR-2024-AVI-0873
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling | Sterling B2B Integrator versions 6.x antérieures à 6.1.2.5_1 | ||
| IBM | Sterling | Sterling B2B Integrator versions 6.2.x antérieures à 6.2.0.3 | ||
| IBM | QRadar | Security QRadar EDR versions 3.12.x antérieures à 3.12.12 | ||
| IBM | QRadar Suite Software | QRadar Suite versions antérieures à 1.10.26.0 |
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling B2B Integrator versions 6.x ant\u00e9rieures \u00e0 6.1.2.5_1",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.3",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions 3.12.x ant\u00e9rieures \u00e0 3.12.12",
"product": {
"name": "QRadar",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Suite versions ant\u00e9rieures \u00e0 1.10.26.0",
"product": {
"name": "QRadar Suite Software",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2022-24999",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24999"
},
{
"name": "CVE-2024-5569",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5569"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2024-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38428"
},
{
"name": "CVE-2024-42367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42367"
},
{
"name": "CVE-2024-34750",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34750"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2024-41818",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41818"
},
{
"name": "CVE-2023-50314",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50314"
},
{
"name": "CVE-2023-26136",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26136"
},
{
"name": "CVE-2024-6221",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6221"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-31903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31903"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
}
],
"initial_release_date": "2024-10-11T00:00:00",
"last_revision_date": "2024-10-11T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-0873",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-10-11T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-10-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172233",
"url": "https://www.ibm.com/support/pages/node/7172233"
},
{
"published_at": "2024-10-04",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172211",
"url": "https://www.ibm.com/support/pages/node/7172211"
},
{
"published_at": "2024-10-09",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7172678",
"url": "https://www.ibm.com/support/pages/node/7172678"
}
]
}
WID-SEC-W-2024-1913
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1913 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1913.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1913 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1913"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5433 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5436 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5439 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5439"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5442 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5442"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5444 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5444"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5446 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5749 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5749"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6054 vom 2024-08-30",
"url": "https://access.redhat.com/errata/RHSA-2024:6054"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-12606.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6159 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6159"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6011 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6409 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6409"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13",
"url": "https://access.redhat.com/errata/RHSA-2024:6667"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6642"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6687 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6687"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6685 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6685"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6994"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6811 vom 2024-09-25",
"url": "https://access.redhat.com/errata/RHSA-2024:6811"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7237 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7174 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7174"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7436 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3722 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3718 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3718"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7624 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7624"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7324 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7324"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7744 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7744"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8040 vom 2024-10-14",
"url": "https://access.redhat.com/errata/RHSA-2024:8040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8677"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8876 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8876.html"
},
{
"category": "external",
"summary": "Red Hat vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9089"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10775 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10775"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10823 vom 2024-12-12",
"url": "https://access.redhat.com/errata/RHSA-2024:10823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11562 vom 2025-01-02",
"url": "https://access.redhat.com/errata/RHSA-2024:11562"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2727 vom 2025-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1116"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1038-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDUSLVUE4ABN4A2UXKEXXYBVNZYOL62N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1037-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HRXHLPSCYZEZQ6GJKOABY44N37DC5ST2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1036-1 vom 2025-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14988-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-099 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20013-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11669 vom 2025-07-31",
"url": "https://access.redhat.com/errata/RHSA-2025:11669"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-30T22:00:00.000+00:00",
"generator": {
"date": "2025-07-31T07:59:47.173+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1913",
"initial_release_date": "2024-08-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von ORACLE und Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "39"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T027916",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T038904",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.35",
"product_id": "T037037"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.35",
"product_id": "T037037-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.35"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.28",
"product_id": "T037038"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.28",
"product_id": "T037038-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.28"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.48",
"product_id": "T037039"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.48",
"product_id": "T037039-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.48"
}
}
},
{
"category": "product_version",
"name": "CodeReady Workspaces",
"product": {
"name": "Red Hat OpenShift CodeReady Workspaces",
"product_id": "T037618",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:codeready_workspaces"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.9.7",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.9.7",
"product_id": "T037939",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging_subsystem_5.9.7"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.38",
"product_id": "T037940"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.38",
"product_id": "T037940-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.14.11",
"product_id": "T037941"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.14.11",
"product_id": "T037941-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.11"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.42",
"product_id": "T039989"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.42",
"product_id": "T039989-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.42"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.54",
"product_id": "T045757"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.54",
"product_id": "T045757-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.54"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2018-15209"
},
{
"cve": "CVE-2021-46939",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-46939"
},
{
"cve": "CVE-2021-47018",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47018"
},
{
"cve": "CVE-2021-47257",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47257"
},
{
"cve": "CVE-2021-47284",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47304",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47304"
},
{
"cve": "CVE-2021-47373",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47373"
},
{
"cve": "CVE-2021-47383",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47408",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47408"
},
{
"cve": "CVE-2021-47461",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47461"
},
{
"cve": "CVE-2021-47468",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47468"
},
{
"cve": "CVE-2021-47491",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47491"
},
{
"cve": "CVE-2021-47548",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47579",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47579"
},
{
"cve": "CVE-2021-47624",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47624"
},
{
"cve": "CVE-2022-48632",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48632"
},
{
"cve": "CVE-2022-48637",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48637"
},
{
"cve": "CVE-2022-48743",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48743"
},
{
"cve": "CVE-2022-48747",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48747"
},
{
"cve": "CVE-2022-48757",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48757"
},
{
"cve": "CVE-2023-25433",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-28746",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-45142",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2023-45290",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45290"
},
{
"cve": "CVE-2023-47108",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-47108"
},
{
"cve": "CVE-2023-48795",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52356",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2023-52448",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52451",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52458",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52463",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52469",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52469"
},
{
"cve": "CVE-2023-52471",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52471"
},
{
"cve": "CVE-2023-52486",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52530",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52619",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52635",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52635"
},
{
"cve": "CVE-2023-52648",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52648"
},
{
"cve": "CVE-2023-52651",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52651"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52658",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52658"
},
{
"cve": "CVE-2023-52662",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52662"
},
{
"cve": "CVE-2023-52679",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52679"
},
{
"cve": "CVE-2023-52707",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52756",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52756"
},
{
"cve": "CVE-2023-52762",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52762"
},
{
"cve": "CVE-2023-52764",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52771",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52771"
},
{
"cve": "CVE-2023-52775",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52775"
},
{
"cve": "CVE-2023-52777",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52777"
},
{
"cve": "CVE-2023-52784",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52791",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52809",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52811",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52811"
},
{
"cve": "CVE-2023-52832",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52834",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52834"
},
{
"cve": "CVE-2023-52845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2023-6228",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-6228"
},
{
"cve": "CVE-2024-21823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-21823"
},
{
"cve": "CVE-2024-2201",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-2201"
},
{
"cve": "CVE-2024-24788",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24788"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-25739",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-25739"
},
{
"cve": "CVE-2024-26586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26601",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26601"
},
{
"cve": "CVE-2024-26614",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26614"
},
{
"cve": "CVE-2024-26640",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26640"
},
{
"cve": "CVE-2024-26660",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26660"
},
{
"cve": "CVE-2024-26669",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26669"
},
{
"cve": "CVE-2024-26686",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26686"
},
{
"cve": "CVE-2024-26698",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26698"
},
{
"cve": "CVE-2024-26704",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26733",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26733"
},
{
"cve": "CVE-2024-26737",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26737"
},
{
"cve": "CVE-2024-26740",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26740"
},
{
"cve": "CVE-2024-26772",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26802",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26802"
},
{
"cve": "CVE-2024-26810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26837",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26837"
},
{
"cve": "CVE-2024-26840",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26843",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26843"
},
{
"cve": "CVE-2024-26852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26853",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26853"
},
{
"cve": "CVE-2024-26855",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26855"
},
{
"cve": "CVE-2024-26870",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26870"
},
{
"cve": "CVE-2024-26878",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26878"
},
{
"cve": "CVE-2024-26897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26897"
},
{
"cve": "CVE-2024-26908",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26908"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26940"
},
{
"cve": "CVE-2024-26947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26947"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26960"
},
{
"cve": "CVE-2024-26961",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26961"
},
{
"cve": "CVE-2024-27010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27010"
},
{
"cve": "CVE-2024-27011",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27011"
},
{
"cve": "CVE-2024-27019",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27030",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27030"
},
{
"cve": "CVE-2024-27046",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27046"
},
{
"cve": "CVE-2024-27052",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27065",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27065"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27395",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27434",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27434"
},
{
"cve": "CVE-2024-31076",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-31076"
},
{
"cve": "CVE-2024-33621",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35790"
},
{
"cve": "CVE-2024-35801",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35801"
},
{
"cve": "CVE-2024-35807",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35810"
},
{
"cve": "CVE-2024-35814",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35814"
},
{
"cve": "CVE-2024-35823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35823"
},
{
"cve": "CVE-2024-35824",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35824"
},
{
"cve": "CVE-2024-35845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35847"
},
{
"cve": "CVE-2024-35852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35852"
},
{
"cve": "CVE-2024-35876",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35876"
},
{
"cve": "CVE-2024-35885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35885"
},
{
"cve": "CVE-2024-35893",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35897"
},
{
"cve": "CVE-2024-35899",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-35900",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35900"
},
{
"cve": "CVE-2024-35907",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35907"
},
{
"cve": "CVE-2024-35910",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-35912",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35912"
},
{
"cve": "CVE-2024-35924",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35924"
},
{
"cve": "CVE-2024-35925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35937",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35937"
},
{
"cve": "CVE-2024-35938",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35938"
},
{
"cve": "CVE-2024-35946",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35946"
},
{
"cve": "CVE-2024-35947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35952",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35952"
},
{
"cve": "CVE-2024-35962",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-36000",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36000"
},
{
"cve": "CVE-2024-36005",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36010"
},
{
"cve": "CVE-2024-36016",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36020"
},
{
"cve": "CVE-2024-36025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36025"
},
{
"cve": "CVE-2024-36270",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36489",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36886",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36886"
},
{
"cve": "CVE-2024-36889",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36889"
},
{
"cve": "CVE-2024-36896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36896"
},
{
"cve": "CVE-2024-36904",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36917",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36917"
},
{
"cve": "CVE-2024-36921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36921"
},
{
"cve": "CVE-2024-36922",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36922"
},
{
"cve": "CVE-2024-36927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36927"
},
{
"cve": "CVE-2024-36929",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36933",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36933"
},
{
"cve": "CVE-2024-36940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36941",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36941"
},
{
"cve": "CVE-2024-36945",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36945"
},
{
"cve": "CVE-2024-36950",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36950"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-36960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36960"
},
{
"cve": "CVE-2024-36971",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-36978",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-36979",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36979"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38384",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38384"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-38473",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38538",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38538"
},
{
"cve": "CVE-2024-38555",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38556",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38556"
},
{
"cve": "CVE-2024-38573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38573"
},
{
"cve": "CVE-2024-38575",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38575"
},
{
"cve": "CVE-2024-38586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38596",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38598",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38615",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38627",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38663",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38663"
},
{
"cve": "CVE-2024-39276",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39276"
},
{
"cve": "CVE-2024-39472",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39472"
},
{
"cve": "CVE-2024-39476",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39487",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39502",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-40897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40897"
},
{
"cve": "CVE-2024-40927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40927"
},
{
"cve": "CVE-2024-40974",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40974"
},
{
"cve": "CVE-2024-6104",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6104"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6409",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6409"
}
]
}
WID-SEC-W-2024-1789
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1789 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2024-1789.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1789 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1789"
},
{
"category": "external",
"summary": "Eintrag in der Mitre Datenbank CVE-2018-15209 vom 2018-08-08",
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3289-1 vom 2018-10-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3327-1 vom 2018-10-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183327-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3391-1 vom 2018-10-25",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183391-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4349 vom 2018-12-01",
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5079 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5079 vom 2024-08-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-5079.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5079 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5079"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-08-21T22:00:00.000+00:00",
"generator": {
"date": "2024-08-22T08:13:43.153+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1789",
"initial_release_date": "2018-08-08T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-10-22T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-10-23T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-10-24T22:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2018-12-02T23:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.0.9",
"product": {
"name": "Open Source libTIFF 4.0.9",
"product_id": "T012166",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:4.0.9"
}
}
}
],
"category": "product_name",
"name": "libTIFF"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in libTIFF. Die Schwachstelle besteht aufgrund eines Heap basierten Puffer\u00fcberlaufs in ChopUpSingleUncompressedStrip in tif_dirread.c. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service oder m\u00f6glicherweise andere, nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte TIFF Datei zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T012166",
"T004914",
"T032255"
]
},
"release_date": "2018-08-08T22:00:00.000+00:00",
"title": "CVE-2018-15209"
}
]
}
wid-sec-w-2024-1913
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Red Hat OpenShift ist eine \"Platform as a Service\" (PaaS) L\u00f6sung zur Bereitstellung von Applikationen in der Cloud.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter anonymer oder lokaler Angreifer kann mehrere Schwachstellen in Red Hat OpenShift Container Platform ausnutzen, um seine Privilegien zu erh\u00f6hen, beliebigen Code auszuf\u00fchren, einen Denial-of-Service-Zustand zu erzeugen, vertrauliche Informationen offenzulegen, Dateien und Daten zu manipulieren oder Sicherheitsma\u00dfnahmen zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1913 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1913.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1913 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1913"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5433 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5433"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5436 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5439 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5439"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5442 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5442"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5444 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5444"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5446 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5446"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5749 vom 2024-08-22",
"url": "https://access.redhat.com/errata/RHSA-2024:5749"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6054 vom 2024-08-30",
"url": "https://access.redhat.com/errata/RHSA-2024:6054"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-12606 vom 2024-09-03",
"url": "https://linux.oracle.com/errata/ELSA-2024-12606.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6159 vom 2024-09-03",
"url": "https://access.redhat.com/errata/RHSA-2024:6159"
},
{
"category": "external",
"summary": "ORACLE OVMSA-2024-0011 vom 2024-09-04",
"url": "https://oss.oracle.com/pipermail/oraclevm-errata/2024-September/001099.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6011 vom 2024-09-04",
"url": "https://access.redhat.com/errata/RHSA-2024:6011"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6409 vom 2024-09-11",
"url": "https://access.redhat.com/errata/RHSA-2024:6409"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6667 vom 2024-09-13",
"url": "https://access.redhat.com/errata/RHSA-2024:6667"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6642 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6642"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6755 vom 2024-09-18",
"url": "https://access.redhat.com/errata/RHSA-2024:6755"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6687 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6687"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6685 vom 2024-09-19",
"url": "https://access.redhat.com/errata/RHSA-2024:6685"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7001 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7001"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6998 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6998"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6994 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6994"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6995 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6995"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6997 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:6997"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7000 vom 2024-09-24",
"url": "https://access.redhat.com/errata/RHSA-2024:7000"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:6811 vom 2024-09-25",
"url": "https://access.redhat.com/errata/RHSA-2024:6811"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7237 vom 2024-09-26",
"url": "https://access.redhat.com/errata/RHSA-2024:7237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7174 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7174"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7436 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7436"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3722 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3722"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:3718 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:3718"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7624 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7624"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7184 vom 2024-10-03",
"url": "https://access.redhat.com/errata/RHSA-2024:7184"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7324 vom 2024-10-02",
"url": "https://access.redhat.com/errata/RHSA-2024:7324"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7744 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7744"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:7323 vom 2024-10-07",
"url": "https://access.redhat.com/errata/RHSA-2024:7323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8040 vom 2024-10-14",
"url": "https://access.redhat.com/errata/RHSA-2024:8040"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8318 vom 2024-10-23",
"url": "https://access.redhat.com/errata/RHSA-2024:8318"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:8677 vom 2024-10-30",
"url": "https://access.redhat.com/errata/RHSA-2024:8677"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3803-1 vom 2024-10-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019712.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:3849-1 vom 2024-10-31",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-October/019742.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8856 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8856.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-8876 vom 2024-11-06",
"url": "https://linux.oracle.com/errata/ELSA-2024-8876.html"
},
{
"category": "external",
"summary": "Red Hat vom 2024-11-12",
"url": "https://access.redhat.com/errata/RHSA-2024:9089"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10135 vom 2024-11-21",
"url": "https://access.redhat.com/errata/RHSA-2024:10135"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10775 vom 2024-12-04",
"url": "https://access.redhat.com/errata/RHSA-2024:10775"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2024:4250-1 vom 2024-12-06",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-December/019952.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:10823 vom 2024-12-12",
"url": "https://access.redhat.com/errata/RHSA-2024:10823"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:11562 vom 2025-01-02",
"url": "https://access.redhat.com/errata/RHSA-2024:11562"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7180361 vom 2025-01-07",
"url": "https://www.ibm.com/support/pages/node/7180361"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2025-2727 vom 2025-01-10",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2025-2727.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0091-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020100.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:0101-1 vom 2025-01-14",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-January/020116.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:1116 vom 2025-02-13",
"url": "https://access.redhat.com/errata/RHSA-2025:1116"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1038-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/RDUSLVUE4ABN4A2UXKEXXYBVNZYOL62N/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1037-1 vom 2025-03-27",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/HRXHLPSCYZEZQ6GJKOABY44N37DC5ST2/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:1036-1 vom 2025-03-27",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-March/020615.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:14988-1 vom 2025-04-15",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/message/IQWUH5CIGBJCVZRE6D76AYCLT3MS47XX/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALASKERNEL-5.4-2025-099 vom 2025-04-29",
"url": "https://alas.aws.amazon.com/AL2/ALASKERNEL-5.4-2025-099.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:20013-1 vom 2025-06-04",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-June/021364.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7236419 vom 2025-06-30",
"url": "https://www.ibm.com/support/pages/node/7236419"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2025:11669 vom 2025-07-31",
"url": "https://access.redhat.com/errata/RHSA-2025:11669"
}
],
"source_lang": "en-US",
"title": "Red Hat OpenShift Container Platform: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-07-30T22:00:00.000+00:00",
"generator": {
"date": "2025-07-31T07:59:47.173+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2024-1913",
"initial_release_date": "2024-08-22T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-08-22T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-08-29T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-02T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-09-03T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-04T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von ORACLE und Red Hat aufgenommen"
},
{
"date": "2024-09-11T22:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-12T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-17T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-18T22:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-23T22:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-24T22:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-09-26T22:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-01T22:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-03T22:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-07T22:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-13T22:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-23T22:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-10-30T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von Red Hat und SUSE aufgenommen"
},
{
"date": "2024-10-31T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-11-05T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-06T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-11-20T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-03T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2024-12-08T23:00:00.000+00:00",
"number": "25",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2024-12-11T23:00:00.000+00:00",
"number": "26",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-02T23:00:00.000+00:00",
"number": "27",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-01-06T23:00:00.000+00:00",
"number": "28",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-01-09T23:00:00.000+00:00",
"number": "29",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-01-13T23:00:00.000+00:00",
"number": "30",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-01-14T23:00:00.000+00:00",
"number": "31",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-02-12T23:00:00.000+00:00",
"number": "32",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2025-03-26T23:00:00.000+00:00",
"number": "33",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-03-27T23:00:00.000+00:00",
"number": "34",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-04-15T22:00:00.000+00:00",
"number": "35",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2025-04-29T22:00:00.000+00:00",
"number": "36",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-06-04T22:00:00.000+00:00",
"number": "37",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-06-30T22:00:00.000+00:00",
"number": "38",
"summary": "Neue Updates von IBM aufgenommen"
},
{
"date": "2025-07-30T22:00:00.000+00:00",
"number": "39",
"summary": "Neue Updates von Red Hat aufgenommen"
}
],
"status": "final",
"version": "39"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus \u003c10.1.6.4",
"product_id": "T040030"
}
},
{
"category": "product_version",
"name": "10.1.6.4",
"product": {
"name": "IBM Spectrum Protect Plus 10.1.6.4",
"product_id": "T040030-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:spectrum_protect_plus:10.1.6.4"
}
}
}
],
"category": "product_name",
"name": "Spectrum Protect Plus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c6.1.9.7",
"product": {
"name": "IBM Storage Scale System \u003c6.1.9.7",
"product_id": "T044961"
}
},
{
"category": "product_version",
"name": "6.1.9.7",
"product": {
"name": "IBM Storage Scale System 6.1.9.7",
"product_id": "T044961-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.1.9.7"
}
}
},
{
"category": "product_version_range",
"name": "\u003c6.2.3.0",
"product": {
"name": "IBM Storage Scale System \u003c6.2.3.0",
"product_id": "T044962"
}
},
{
"category": "product_version",
"name": "6.2.3.0",
"product": {
"name": "IBM Storage Scale System 6.2.3.0",
"product_id": "T044962-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:ibm:storage_scale_system:6.2.3.0"
}
}
}
],
"category": "product_name",
"name": "Storage Scale System"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
},
{
"category": "product_version",
"name": "Advanced Cluster Security for Kubernetes 4",
"product": {
"name": "Red Hat Enterprise Linux Advanced Cluster Security for Kubernetes 4",
"product_id": "T027916",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:advanced_cluster_security_for_kubernetes_4"
}
}
},
{
"category": "product_version",
"name": "9",
"product": {
"name": "Red Hat Enterprise Linux 9",
"product_id": "T038904",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:9"
}
}
}
],
"category": "product_name",
"name": "Enterprise Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.35",
"product_id": "T037037"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.35",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.35",
"product_id": "T037037-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.35"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.28",
"product_id": "T037038"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.28",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.28",
"product_id": "T037038-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.28"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.13.48",
"product_id": "T037039"
}
},
{
"category": "product_version",
"name": "Container Platform 4.13.48",
"product": {
"name": "Red Hat OpenShift Container Platform 4.13.48",
"product_id": "T037039-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.13.48"
}
}
},
{
"category": "product_version",
"name": "CodeReady Workspaces",
"product": {
"name": "Red Hat OpenShift CodeReady Workspaces",
"product_id": "T037618",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:codeready_workspaces"
}
}
},
{
"category": "product_version",
"name": "Logging Subsystem 5.9.7",
"product": {
"name": "Red Hat OpenShift Logging Subsystem 5.9.7",
"product_id": "T037939",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:logging_subsystem_5.9.7"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.38",
"product_id": "T037940"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.38",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.38",
"product_id": "T037940-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.38"
}
}
},
{
"category": "product_version_range",
"name": "Data Foundation \u003c4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation \u003c4.14.11",
"product_id": "T037941"
}
},
{
"category": "product_version",
"name": "Data Foundation 4.14.11",
"product": {
"name": "Red Hat OpenShift Data Foundation 4.14.11",
"product_id": "T037941-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:data_foundation__4.14.11"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.15.42",
"product_id": "T039989"
}
},
{
"category": "product_version",
"name": "Container Platform 4.15.42",
"product": {
"name": "Red Hat OpenShift Container Platform 4.15.42",
"product_id": "T039989-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.15.42"
}
}
},
{
"category": "product_version_range",
"name": "Container Platform \u003c4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform \u003c4.14.54",
"product_id": "T045757"
}
},
{
"category": "product_version",
"name": "Container Platform 4.14.54",
"product": {
"name": "Red Hat OpenShift Container Platform 4.14.54",
"product_id": "T045757-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:openshift:container_platform__4.14.54"
}
}
}
],
"category": "product_name",
"name": "OpenShift"
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2018-15209"
},
{
"cve": "CVE-2021-46939",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-46939"
},
{
"cve": "CVE-2021-47018",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47018"
},
{
"cve": "CVE-2021-47257",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47257"
},
{
"cve": "CVE-2021-47284",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47284"
},
{
"cve": "CVE-2021-47304",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47304"
},
{
"cve": "CVE-2021-47373",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47373"
},
{
"cve": "CVE-2021-47383",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47383"
},
{
"cve": "CVE-2021-47408",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47408"
},
{
"cve": "CVE-2021-47461",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47461"
},
{
"cve": "CVE-2021-47468",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47468"
},
{
"cve": "CVE-2021-47491",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47491"
},
{
"cve": "CVE-2021-47548",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47548"
},
{
"cve": "CVE-2021-47579",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47579"
},
{
"cve": "CVE-2021-47624",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2021-47624"
},
{
"cve": "CVE-2022-48632",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48632"
},
{
"cve": "CVE-2022-48637",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48637"
},
{
"cve": "CVE-2022-48743",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48743"
},
{
"cve": "CVE-2022-48747",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48747"
},
{
"cve": "CVE-2022-48757",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2022-48757"
},
{
"cve": "CVE-2023-25433",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-25433"
},
{
"cve": "CVE-2023-28746",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-28746"
},
{
"cve": "CVE-2023-45142",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45142"
},
{
"cve": "CVE-2023-45290",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-45290"
},
{
"cve": "CVE-2023-47108",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-47108"
},
{
"cve": "CVE-2023-48795",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-52356",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52356"
},
{
"cve": "CVE-2023-52448",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52448"
},
{
"cve": "CVE-2023-52451",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52451"
},
{
"cve": "CVE-2023-52458",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52458"
},
{
"cve": "CVE-2023-52463",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52463"
},
{
"cve": "CVE-2023-52469",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52469"
},
{
"cve": "CVE-2023-52471",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52471"
},
{
"cve": "CVE-2023-52486",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52486"
},
{
"cve": "CVE-2023-52530",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52530"
},
{
"cve": "CVE-2023-52619",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52619"
},
{
"cve": "CVE-2023-52622",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52622"
},
{
"cve": "CVE-2023-52623",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52623"
},
{
"cve": "CVE-2023-52635",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52635"
},
{
"cve": "CVE-2023-52648",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52648"
},
{
"cve": "CVE-2023-52651",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52651"
},
{
"cve": "CVE-2023-52653",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52653"
},
{
"cve": "CVE-2023-52658",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52658"
},
{
"cve": "CVE-2023-52662",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52662"
},
{
"cve": "CVE-2023-52679",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52679"
},
{
"cve": "CVE-2023-52707",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52707"
},
{
"cve": "CVE-2023-52730",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52730"
},
{
"cve": "CVE-2023-52756",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52756"
},
{
"cve": "CVE-2023-52762",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52762"
},
{
"cve": "CVE-2023-52764",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52764"
},
{
"cve": "CVE-2023-52771",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52771"
},
{
"cve": "CVE-2023-52775",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52775"
},
{
"cve": "CVE-2023-52777",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52777"
},
{
"cve": "CVE-2023-52784",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52784"
},
{
"cve": "CVE-2023-52791",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52791"
},
{
"cve": "CVE-2023-52796",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52796"
},
{
"cve": "CVE-2023-52803",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52803"
},
{
"cve": "CVE-2023-52809",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52809"
},
{
"cve": "CVE-2023-52811",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52811"
},
{
"cve": "CVE-2023-52832",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52832"
},
{
"cve": "CVE-2023-52834",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52834"
},
{
"cve": "CVE-2023-52845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52845"
},
{
"cve": "CVE-2023-52847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52847"
},
{
"cve": "CVE-2023-52864",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52864"
},
{
"cve": "CVE-2023-52885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-52885"
},
{
"cve": "CVE-2023-6228",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2023-6228"
},
{
"cve": "CVE-2024-21823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-21823"
},
{
"cve": "CVE-2024-2201",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-2201"
},
{
"cve": "CVE-2024-24788",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24788"
},
{
"cve": "CVE-2024-24790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-24790"
},
{
"cve": "CVE-2024-25739",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-25739"
},
{
"cve": "CVE-2024-26586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26586"
},
{
"cve": "CVE-2024-26601",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26601"
},
{
"cve": "CVE-2024-26614",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26614"
},
{
"cve": "CVE-2024-26640",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26640"
},
{
"cve": "CVE-2024-26660",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26660"
},
{
"cve": "CVE-2024-26669",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26669"
},
{
"cve": "CVE-2024-26686",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26686"
},
{
"cve": "CVE-2024-26698",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26698"
},
{
"cve": "CVE-2024-26704",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26704"
},
{
"cve": "CVE-2024-26733",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26733"
},
{
"cve": "CVE-2024-26737",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26737"
},
{
"cve": "CVE-2024-26740",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26740"
},
{
"cve": "CVE-2024-26772",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26772"
},
{
"cve": "CVE-2024-26773",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26773"
},
{
"cve": "CVE-2024-26802",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26802"
},
{
"cve": "CVE-2024-26810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26810"
},
{
"cve": "CVE-2024-26837",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26837"
},
{
"cve": "CVE-2024-26840",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26840"
},
{
"cve": "CVE-2024-26843",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26843"
},
{
"cve": "CVE-2024-26852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26852"
},
{
"cve": "CVE-2024-26853",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26853"
},
{
"cve": "CVE-2024-26855",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26855"
},
{
"cve": "CVE-2024-26870",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26870"
},
{
"cve": "CVE-2024-26878",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26878"
},
{
"cve": "CVE-2024-26897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26897"
},
{
"cve": "CVE-2024-26908",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26908"
},
{
"cve": "CVE-2024-26921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26921"
},
{
"cve": "CVE-2024-26925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26925"
},
{
"cve": "CVE-2024-26930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26930"
},
{
"cve": "CVE-2024-26940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26940"
},
{
"cve": "CVE-2024-26947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26947"
},
{
"cve": "CVE-2024-26958",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26958"
},
{
"cve": "CVE-2024-26960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26960"
},
{
"cve": "CVE-2024-26961",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-26961"
},
{
"cve": "CVE-2024-27010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27010"
},
{
"cve": "CVE-2024-27011",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27011"
},
{
"cve": "CVE-2024-27019",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27019"
},
{
"cve": "CVE-2024-27020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27020"
},
{
"cve": "CVE-2024-27025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27025"
},
{
"cve": "CVE-2024-27030",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27030"
},
{
"cve": "CVE-2024-27046",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27046"
},
{
"cve": "CVE-2024-27052",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27052"
},
{
"cve": "CVE-2024-27062",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27062"
},
{
"cve": "CVE-2024-27065",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27065"
},
{
"cve": "CVE-2024-27388",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27388"
},
{
"cve": "CVE-2024-27395",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27395"
},
{
"cve": "CVE-2024-27434",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-27434"
},
{
"cve": "CVE-2024-31076",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-31076"
},
{
"cve": "CVE-2024-33621",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-33621"
},
{
"cve": "CVE-2024-34064",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35789",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35789"
},
{
"cve": "CVE-2024-35790",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35790"
},
{
"cve": "CVE-2024-35801",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35801"
},
{
"cve": "CVE-2024-35807",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35807"
},
{
"cve": "CVE-2024-35810",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35810"
},
{
"cve": "CVE-2024-35814",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35814"
},
{
"cve": "CVE-2024-35823",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35823"
},
{
"cve": "CVE-2024-35824",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35824"
},
{
"cve": "CVE-2024-35845",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35845"
},
{
"cve": "CVE-2024-35847",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35847"
},
{
"cve": "CVE-2024-35852",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35852"
},
{
"cve": "CVE-2024-35876",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35876"
},
{
"cve": "CVE-2024-35885",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35885"
},
{
"cve": "CVE-2024-35893",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35893"
},
{
"cve": "CVE-2024-35896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35896"
},
{
"cve": "CVE-2024-35897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35897"
},
{
"cve": "CVE-2024-35899",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35899"
},
{
"cve": "CVE-2024-35900",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35900"
},
{
"cve": "CVE-2024-35907",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35907"
},
{
"cve": "CVE-2024-35910",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35910"
},
{
"cve": "CVE-2024-35912",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35912"
},
{
"cve": "CVE-2024-35924",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35924"
},
{
"cve": "CVE-2024-35925",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35925"
},
{
"cve": "CVE-2024-35930",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35930"
},
{
"cve": "CVE-2024-35937",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35937"
},
{
"cve": "CVE-2024-35938",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35938"
},
{
"cve": "CVE-2024-35946",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35946"
},
{
"cve": "CVE-2024-35947",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35947"
},
{
"cve": "CVE-2024-35952",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35952"
},
{
"cve": "CVE-2024-35962",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-35962"
},
{
"cve": "CVE-2024-36000",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36000"
},
{
"cve": "CVE-2024-36005",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36005"
},
{
"cve": "CVE-2024-36006",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36006"
},
{
"cve": "CVE-2024-36010",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36010"
},
{
"cve": "CVE-2024-36016",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36016"
},
{
"cve": "CVE-2024-36017",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36017"
},
{
"cve": "CVE-2024-36020",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36020"
},
{
"cve": "CVE-2024-36025",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36025"
},
{
"cve": "CVE-2024-36270",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36270"
},
{
"cve": "CVE-2024-36286",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36286"
},
{
"cve": "CVE-2024-36489",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36489"
},
{
"cve": "CVE-2024-36886",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36886"
},
{
"cve": "CVE-2024-36889",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36889"
},
{
"cve": "CVE-2024-36896",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36896"
},
{
"cve": "CVE-2024-36904",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36904"
},
{
"cve": "CVE-2024-36905",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36905"
},
{
"cve": "CVE-2024-36917",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36917"
},
{
"cve": "CVE-2024-36921",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36921"
},
{
"cve": "CVE-2024-36922",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36922"
},
{
"cve": "CVE-2024-36927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36927"
},
{
"cve": "CVE-2024-36929",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36929"
},
{
"cve": "CVE-2024-36933",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36933"
},
{
"cve": "CVE-2024-36940",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36940"
},
{
"cve": "CVE-2024-36941",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36941"
},
{
"cve": "CVE-2024-36945",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36945"
},
{
"cve": "CVE-2024-36950",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36950"
},
{
"cve": "CVE-2024-36954",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36954"
},
{
"cve": "CVE-2024-36960",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36960"
},
{
"cve": "CVE-2024-36971",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36971"
},
{
"cve": "CVE-2024-36978",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36978"
},
{
"cve": "CVE-2024-36979",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-36979"
},
{
"cve": "CVE-2024-37370",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37370"
},
{
"cve": "CVE-2024-37371",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37371"
},
{
"cve": "CVE-2024-37891",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38384",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38384"
},
{
"cve": "CVE-2024-38428",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38428"
},
{
"cve": "CVE-2024-38473",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38473"
},
{
"cve": "CVE-2024-38538",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38538"
},
{
"cve": "CVE-2024-38555",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38555"
},
{
"cve": "CVE-2024-38556",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38556"
},
{
"cve": "CVE-2024-38573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38573"
},
{
"cve": "CVE-2024-38575",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38575"
},
{
"cve": "CVE-2024-38586",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38586"
},
{
"cve": "CVE-2024-38596",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38596"
},
{
"cve": "CVE-2024-38598",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38598"
},
{
"cve": "CVE-2024-38615",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38615"
},
{
"cve": "CVE-2024-38627",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38627"
},
{
"cve": "CVE-2024-38663",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-38663"
},
{
"cve": "CVE-2024-39276",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39276"
},
{
"cve": "CVE-2024-39472",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39472"
},
{
"cve": "CVE-2024-39476",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39476"
},
{
"cve": "CVE-2024-39487",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39487"
},
{
"cve": "CVE-2024-39502",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39502"
},
{
"cve": "CVE-2024-39573",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-39573"
},
{
"cve": "CVE-2024-40897",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40897"
},
{
"cve": "CVE-2024-40927",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40927"
},
{
"cve": "CVE-2024-40974",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-40974"
},
{
"cve": "CVE-2024-6104",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6104"
},
{
"cve": "CVE-2024-6345",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6345"
},
{
"cve": "CVE-2024-6409",
"product_status": {
"known_affected": [
"T037618",
"T038904",
"T037939",
"67646",
"T039989",
"T037037",
"T037940",
"T037038",
"T037941",
"T037039",
"T004914",
"T044962",
"T044961",
"T040030",
"T027916",
"T002207",
"T045757",
"T027843",
"398363"
]
},
"release_date": "2024-08-22T22:00:00.000+00:00",
"title": "CVE-2024-6409"
}
]
}
wid-sec-w-2024-1789
Vulnerability from csaf_certbund
Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein lokaler Angreifer kann eine Schwachstelle in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1789 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2018/wid-sec-w-2024-1789.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1789 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1789"
},
{
"category": "external",
"summary": "Eintrag in der Mitre Datenbank CVE-2018-15209 vom 2018-08-08",
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15209"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3289-1 vom 2018-10-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183289-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3327-1 vom 2018-10-23",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183327-1.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2018:3391-1 vom 2018-10-25",
"url": "https://www.suse.com/support/update/announcement/2018/suse-su-20183391-1.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-4349 vom 2018-12-01",
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2024:5079 vom 2024-08-07",
"url": "https://access.redhat.com/errata/RHSA-2024:5079"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2024-5079 vom 2024-08-07",
"url": "https://linux.oracle.com/errata/ELSA-2024-5079.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2024:5079 vom 2024-08-21",
"url": "https://errata.build.resf.org/RLSA-2024:5079"
}
],
"source_lang": "en-US",
"title": "libTIFF: Schwachstelle erm\u00f6glicht Denial of Service",
"tracking": {
"current_release_date": "2024-08-21T22:00:00.000+00:00",
"generator": {
"date": "2024-08-22T08:13:43.153+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.6"
}
},
"id": "WID-SEC-W-2024-1789",
"initial_release_date": "2018-08-08T22:00:00.000+00:00",
"revision_history": [
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "1",
"summary": "Initial Release"
},
{
"date": "2018-08-08T22:00:00.000+00:00",
"number": "2",
"summary": "Version nicht vorhanden"
},
{
"date": "2018-10-22T22:00:00.000+00:00",
"number": "3",
"summary": "New remediations available"
},
{
"date": "2018-10-23T22:00:00.000+00:00",
"number": "4",
"summary": "New remediations available"
},
{
"date": "2018-10-24T22:00:00.000+00:00",
"number": "5",
"summary": "New remediations available"
},
{
"date": "2018-12-02T23:00:00.000+00:00",
"number": "6",
"summary": "New remediations available"
},
{
"date": "2024-08-07T22:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2024-08-21T22:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Rocky Enterprise Software Foundation aufgenommen"
}
],
"status": "final",
"version": "8"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "4.0.9",
"product": {
"name": "Open Source libTIFF 4.0.9",
"product_id": "T012166",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:4.0.9"
}
}
}
],
"category": "product_name",
"name": "libTIFF"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2018-15209",
"notes": [
{
"category": "description",
"text": "Es existiert eine Schwachstelle in libTIFF. Die Schwachstelle besteht aufgrund eines Heap basierten Puffer\u00fcberlaufs in ChopUpSingleUncompressedStrip in tif_dirread.c. Ein lokaler Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service oder m\u00f6glicherweise andere, nicht spezifizierte Auswirkungen zu verursachen. Zur erfolgreichen Ausnutzung dieser Schwachstelle muss der Angreifer den Benutzer dazu bringen, eine modifizierte TIFF Datei zu \u00f6ffnen."
}
],
"product_status": {
"known_affected": [
"2951",
"T002207",
"67646",
"T012166",
"T004914",
"T032255"
]
},
"release_date": "2018-08-08T22:00:00.000+00:00",
"title": "CVE-2018-15209"
}
]
}
ghsa-hpvx-h4gg-hpc4
Vulnerability from github
ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.
{
"affected": [],
"aliases": [
"CVE-2018-15209"
],
"database_specific": {
"cwe_ids": [
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-08-08T04:29:00Z",
"severity": "HIGH"
},
"details": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf.",
"id": "GHSA-hpvx-h4gg-hpc4",
"modified": "2022-05-13T01:19:10Z",
"published": "2022-05-13T01:19:10Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209"
},
{
"type": "WEB",
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"type": "WEB",
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/105092"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
cnvd-2018-14916
Vulnerability from cnvd
厂商尚未提供漏洞修复方案,请关注厂商主页更新: http://www.libtiff.org/
| Name | Libtiff LibTiff 4.0.9 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2018-15209"
}
},
"description": "Libtiff\u662f\u4e00\u4e2a\u7528\u4e8e\u8bfb\u53d6\u548c\u5199\u5165\u6807\u8bb0\u56fe\u50cf\u6587\u4ef6\u683c\u5f0f\uff08\u7f29\u5199\u4e3aTIFF\uff09\u6587\u4ef6\u7684\u5e93\u3002\r\n\r\nLibTIFF 4.0.9\u4e2d\u7684tif_dirread.c\u4e2d\u7684ChopUpSingleUncompressedStrip\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u7279\u5236TIFF\u6587\u4ef6\u5229\u7528\u8be5\u6f0f\u6d1e\u5bfc\u81f4\u62d2\u7edd\u670d\u52a1\uff08\u5806\u7f13\u51b2\u533a\u6ea2\u51fa\u548c\u5e94\u7528\u7a0b\u5e8f\u5d29\u6e83\uff09\u6216\u53ef\u80fd\u9020\u6210\u5176\u4ed6\u5f71\u54cd\u3002",
"discovererName": "Marsman1996 and Yanhao",
"formalWay": "\u5382\u5546\u5c1a\u672a\u63d0\u4f9b\u6f0f\u6d1e\u4fee\u590d\u65b9\u6848\uff0c\u8bf7\u5173\u6ce8\u5382\u5546\u4e3b\u9875\u66f4\u65b0\uff1a\r\nhttp://www.libtiff.org/",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-14916",
"openTime": "2018-08-09",
"products": {
"product": "Libtiff LibTiff 4.0.9"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2018-15209\r\nhttp://bugzilla.maptools.org/show_bug.cgi?id=2808",
"serverity": "\u4e2d",
"submitTime": "2018-08-08",
"title": "LibTIFF\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff08CNVD-2018-14916\uff09"
}
fkie_cve-2018-15209
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://bugzilla.maptools.org/show_bug.cgi?id=2808 | Exploit, Issue Tracking, Third Party Advisory | |
| cve@mitre.org | http://www.securityfocus.com/bid/105092 | Third Party Advisory, VDB Entry | |
| cve@mitre.org | https://www.debian.org/security/2018/dsa-4349 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://bugzilla.maptools.org/show_bug.cgi?id=2808 | Exploit, Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/105092 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.debian.org/security/2018/dsa-4349 | Third Party Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| libtiff | libtiff | 4.0.9 | |
| debian | debian_linux | 9.0 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:4.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "27374BA0-7A61-4BDC-9F92-C09E99A9AB81",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DEECE5FC-CACF-4496-A3E7-164736409252",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "ChopUpSingleUncompressedStrip in tif_dirread.c in LibTIFF 4.0.9 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted TIFF file, as demonstrated by tiff2pdf."
},
{
"lang": "es",
"value": "ChopUpSingleUncompressedStrip en tif_dirread.c en LibTIFF 4.0.9 permite que atacantes remotos provoquen una denegaci\u00f3n de servicio (desbordamiento de b\u00fafer y ca\u00edda de aplicaci\u00f3n basada en memoria din\u00e1mica o heap) o, probablemente, provocar cualquier otro tipo de problema mediante un archivo TIFF manipulado, tal y como queda demostrado con tiff2pdf."
}
],
"id": "CVE-2018-15209",
"lastModified": "2024-11-21T03:50:31.700",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-08-08T04:29:00.477",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/105092"
},
{
"source": "cve@mitre.org",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4349"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Exploit",
"Issue Tracking",
"Third Party Advisory"
],
"url": "http://bugzilla.maptools.org/show_bug.cgi?id=2808"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/105092"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://www.debian.org/security/2018/dsa-4349"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.