Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-22872 (GCVE-0-2025-22872)
Vulnerability from cvelistv5
| Vendor | Product | Version | ||
|---|---|---|---|---|
| golang.org/x/net | golang.org/x/net/html |
Version: 0 ≤ |
{
"containers": {
"adp": [
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2025-22872",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-16T20:14:29.607584Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T20:15:13.433Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2025-05-16T23:03:07.693Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20250516-0007/"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "golang.org/x/net/html",
"product": "golang.org/x/net/html",
"programRoutines": [
{
"name": "Tokenizer.readStartTag"
},
{
"name": "Parse"
},
{
"name": "ParseFragment"
},
{
"name": "ParseFragmentWithOptions"
},
{
"name": "ParseWithOptions"
},
{
"name": "Tokenizer.Next"
}
],
"vendor": "golang.org/x/net",
"versions": [
{
"lessThan": "0.38.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Sean Ng (https://ensy.zip)"
}
],
"descriptions": [
{
"lang": "en",
"value": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-79",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-04-16T17:13:02.550Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/662715"
},
{
"url": "https://go.dev/issue/73070"
},
{
"url": "https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA"
},
{
"url": "https://pkg.go.dev/vuln/GO-2025-3595"
}
],
"title": "Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2025-22872",
"datePublished": "2025-04-16T17:13:02.550Z",
"dateReserved": "2025-01-08T19:11:42.834Z",
"dateUpdated": "2025-05-16T23:03:07.693Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-22872\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2025-04-16T18:16:04.183\",\"lastModified\":\"2025-05-16T23:15:19.707\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).\"},{\"lang\":\"es\",\"value\":\"El tokenizador interpreta incorrectamente las etiquetas con valores de atributo sin comillas que terminan en barra (/) como autocerradas. Al usar el tokenizador directamente, esto puede provocar que dichas etiquetas se marquen incorrectamente como autocerradas, y al usar las funciones de an\u00e1lisis, esto puede provocar que el contenido posterior a dichas etiquetas se coloque en el \u00e1mbito incorrecto durante la construcci\u00f3n del DOM, pero solo cuando las etiquetas se encuentran en contenido externo (por ejemplo, contextos , , etc.).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"HIGH\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":2.2,\"impactScore\":3.7}]},\"references\":[{\"url\":\"https://go.dev/cl/662715\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/73070\",\"source\":\"security@golang.org\"},{\"url\":\"https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2025-3595\",\"source\":\"security@golang.org\"},{\"url\":\"https://security.netapp.com/advisory/ntap-20250516-0007/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20250516-0007/\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2025-05-16T23:03:07.693Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 6.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"HIGH\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-22872\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-04-16T20:14:29.607584Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-04-16T20:14:58.303Z\"}}], \"cna\": {\"title\": \"Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net\", \"credits\": [{\"lang\": \"en\", \"value\": \"Sean Ng (https://ensy.zip)\"}], \"affected\": [{\"vendor\": \"golang.org/x/net\", \"product\": \"golang.org/x/net/html\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.38.0\", \"versionType\": \"semver\"}], \"packageName\": \"golang.org/x/net/html\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"Tokenizer.readStartTag\"}, {\"name\": \"Parse\"}, {\"name\": \"ParseFragment\"}, {\"name\": \"ParseFragmentWithOptions\"}, {\"name\": \"ParseWithOptions\"}, {\"name\": \"Tokenizer.Next\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/662715\"}, {\"url\": \"https://go.dev/issue/73070\"}, {\"url\": \"https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2025-3595\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-79\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2025-04-16T17:13:02.550Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-22872\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-16T23:03:07.693Z\", \"dateReserved\": \"2025-01-08T19:11:42.834Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2025-04-16T17:13:02.550Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
opensuse-su-2025:15235-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kubernetes1.31-apiserver-1.31.10-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kubernetes1.31-apiserver-1.31.10-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15235",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15235-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "kubernetes1.31-apiserver-1.31.10-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15235-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-apiserver-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-client-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-client-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-client-common-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-controller-manager-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-kubeadm-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-kubelet-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-proxy-1.31.10-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"product": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"product_id": "kubernetes1.31-scheduler-1.31.10-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-apiserver-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-client-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-client-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-client-common-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-kubelet-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-proxy-1.31.10-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"product": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"product_id": "kubernetes1.31-scheduler-1.31.10-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-apiserver-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-client-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-client-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-common-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-client-common-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-controller-manager-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-kubeadm-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-kubelet-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-kubelet-common-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-proxy-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-proxy-1.31.10-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"product": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"product_id": "kubernetes1.31-scheduler-1.31.10-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-apiserver-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-client-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-client-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-client-common-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-controller-manager-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-kubeadm-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-kubelet-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-proxy-1.31.10-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.31-scheduler-1.31.10-1.1.x86_64",
"product": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.x86_64",
"product_id": "kubernetes1.31-scheduler-1.31.10-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-apiserver-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-client-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-client-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-client-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-client-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-client-common-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-common-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-controller-manager-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubeadm-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-proxy-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-proxy-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.aarch64"
},
"product_reference": "kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.ppc64le"
},
"product_reference": "kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.s390x"
},
"product_reference": "kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.31-scheduler-1.31.10-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.x86_64"
},
"product_reference": "kubernetes1.31-scheduler-1.31.10-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-apiserver-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-bash-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-client-fish-completion-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-controller-manager-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubeadm-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-kubelet-common-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-proxy-1.31.10-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.31-scheduler-1.31.10-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15234-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kubernetes1.30-apiserver-1.30.14-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kubernetes1.30-apiserver-1.30.14-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15234",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15234-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "kubernetes1.30-apiserver-1.30.14-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15234-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-apiserver-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-client-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-client-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-client-common-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-controller-manager-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-kubeadm-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-kubelet-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-proxy-1.30.14-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"product": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"product_id": "kubernetes1.30-scheduler-1.30.14-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-apiserver-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-client-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-client-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-client-common-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-kubelet-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-proxy-1.30.14-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"product": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"product_id": "kubernetes1.30-scheduler-1.30.14-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-apiserver-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-client-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-client-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-common-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-client-common-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-controller-manager-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-kubeadm-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-kubelet-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-kubelet-common-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-proxy-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-proxy-1.30.14-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"product": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"product_id": "kubernetes1.30-scheduler-1.30.14-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-apiserver-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-client-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-client-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-client-common-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-controller-manager-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-kubeadm-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-kubelet-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-proxy-1.30.14-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.30-scheduler-1.30.14-1.1.x86_64",
"product": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.x86_64",
"product_id": "kubernetes1.30-scheduler-1.30.14-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-apiserver-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-client-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-client-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-client-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-client-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-client-common-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-common-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-controller-manager-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubeadm-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-proxy-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-proxy-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.aarch64"
},
"product_reference": "kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.ppc64le"
},
"product_reference": "kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.s390x"
},
"product_reference": "kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.30-scheduler-1.30.14-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.x86_64"
},
"product_reference": "kubernetes1.30-scheduler-1.30.14-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-apiserver-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-bash-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-client-fish-completion-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-controller-manager-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubeadm-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-kubelet-common-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-proxy-1.30.14-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.30-scheduler-1.30.14-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15305-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "traefik2-2.11.26-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the traefik2-2.11.26-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15305",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15305-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-28180 page",
"url": "https://www.suse.com/security/cve/CVE-2024-28180/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45338 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22868 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22869 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22871 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22871/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-32431 page",
"url": "https://www.suse.com/security/cve/CVE-2025-32431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47952 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47952/"
}
],
"title": "traefik2-2.11.26-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15305-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "traefik2-2.11.26-1.1.aarch64",
"product": {
"name": "traefik2-2.11.26-1.1.aarch64",
"product_id": "traefik2-2.11.26-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik2-2.11.26-1.1.ppc64le",
"product": {
"name": "traefik2-2.11.26-1.1.ppc64le",
"product_id": "traefik2-2.11.26-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik2-2.11.26-1.1.s390x",
"product": {
"name": "traefik2-2.11.26-1.1.s390x",
"product_id": "traefik2-2.11.26-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik2-2.11.26-1.1.x86_64",
"product": {
"name": "traefik2-2.11.26-1.1.x86_64",
"product_id": "traefik2-2.11.26-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik2-2.11.26-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64"
},
"product_reference": "traefik2-2.11.26-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik2-2.11.26-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le"
},
"product_reference": "traefik2-2.11.26-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik2-2.11.26-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x"
},
"product_reference": "traefik2-2.11.26-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik2-2.11.26-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
},
"product_reference": "traefik2-2.11.26-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-28180",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-28180"
}
],
"notes": [
{
"category": "general",
"text": "Package jose aims to provide an implementation of the Javascript Object Signing and Encryption set of standards. An attacker could send a JWE containing compressed data that used large amounts of memory and CPU when decompressed by Decrypt or DecryptMulti. Those functions now return an error if the decompressed data would exceed 250kB or 10x the compressed size (whichever is larger). This vulnerability has been patched in versions 4.0.1, 3.0.3 and 2.6.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-28180",
"url": "https://www.suse.com/security/cve/CVE-2024-28180"
},
{
"category": "external",
"summary": "SUSE Bug 1234984 for CVE-2024-28180",
"url": "https://bugzilla.suse.com/1234984"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-28180"
},
{
"cve": "CVE-2024-45338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45338"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45338",
"url": "https://www.suse.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "SUSE Bug 1234794 for CVE-2024-45338",
"url": "https://bugzilla.suse.com/1234794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-45338"
},
{
"cve": "CVE-2025-22868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22868"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22868",
"url": "https://www.suse.com/security/cve/CVE-2025-22868"
},
{
"category": "external",
"summary": "SUSE Bug 1239185 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239185"
},
{
"category": "external",
"summary": "SUSE Bug 1239186 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22868"
},
{
"cve": "CVE-2025-22869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22869"
}
],
"notes": [
{
"category": "general",
"text": "SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22869",
"url": "https://www.suse.com/security/cve/CVE-2025-22869"
},
{
"category": "external",
"summary": "SUSE Bug 1239322 for CVE-2025-22869",
"url": "https://bugzilla.suse.com/1239322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22869"
},
{
"cve": "CVE-2025-22871",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22871"
}
],
"notes": [
{
"category": "general",
"text": "The net/http package improperly accepts a bare LF as a line terminator in chunked data chunk-size lines. This can permit request smuggling if a net/http server is used in conjunction with a server that incorrectly accepts a bare LF as part of a chunk-ext.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22871",
"url": "https://www.suse.com/security/cve/CVE-2025-22871"
},
{
"category": "external",
"summary": "SUSE Bug 1240550 for CVE-2025-22871",
"url": "https://bugzilla.suse.com/1240550"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22871"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27144"
}
],
"notes": [
{
"category": "general",
"text": "Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27144",
"url": "https://www.suse.com/security/cve/CVE-2025-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1237608 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237608"
},
{
"category": "external",
"summary": "SUSE Bug 1237609 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-27144"
},
{
"cve": "CVE-2025-32431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-32431"
}
],
"notes": [
{
"category": "general",
"text": "Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. In versions prior to 2.11.24, 3.3.6, and 3.4.0-rc2. There is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a /../ in its path, it\u0027s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.24, 3.3.6, and 3.4.0-rc2. A workaround involves adding a `PathRegexp` rule to the matcher to prevent matching a route with a `/../` in the path.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-32431",
"url": "https://www.suse.com/security/cve/CVE-2025-32431"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-32431"
},
{
"cve": "CVE-2025-47952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47952"
}
],
"notes": [
{
"category": "general",
"text": "Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it\u0027s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.25 and 3.4.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47952",
"url": "https://www.suse.com/security/cve/CVE-2025-47952"
},
{
"category": "external",
"summary": "SUSE Bug 1243818 for CVE-2025-47952",
"url": "https://bugzilla.suse.com/1243818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.aarch64",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.ppc64le",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.s390x",
"openSUSE Tumbleweed:traefik2-2.11.26-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-47952"
}
]
}
opensuse-su-2025:15028-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "distrobuilder-3.2-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the distrobuilder-3.2-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15028",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15028-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "distrobuilder-3.2-2.1 on GA media",
"tracking": {
"current_release_date": "2025-04-25T00:00:00Z",
"generator": {
"date": "2025-04-25T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15028-1",
"initial_release_date": "2025-04-25T00:00:00Z",
"revision_history": [
{
"date": "2025-04-25T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "distrobuilder-3.2-2.1.aarch64",
"product": {
"name": "distrobuilder-3.2-2.1.aarch64",
"product_id": "distrobuilder-3.2-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "distrobuilder-3.2-2.1.ppc64le",
"product": {
"name": "distrobuilder-3.2-2.1.ppc64le",
"product_id": "distrobuilder-3.2-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "distrobuilder-3.2-2.1.s390x",
"product": {
"name": "distrobuilder-3.2-2.1.s390x",
"product_id": "distrobuilder-3.2-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "distrobuilder-3.2-2.1.x86_64",
"product": {
"name": "distrobuilder-3.2-2.1.x86_64",
"product_id": "distrobuilder-3.2-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "distrobuilder-3.2-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:distrobuilder-3.2-2.1.aarch64"
},
"product_reference": "distrobuilder-3.2-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distrobuilder-3.2-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:distrobuilder-3.2-2.1.ppc64le"
},
"product_reference": "distrobuilder-3.2-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distrobuilder-3.2-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:distrobuilder-3.2-2.1.s390x"
},
"product_reference": "distrobuilder-3.2-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "distrobuilder-3.2-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:distrobuilder-3.2-2.1.x86_64"
},
"product_reference": "distrobuilder-3.2-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.aarch64",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.ppc64le",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.s390x",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.aarch64",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.ppc64le",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.s390x",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.aarch64",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.ppc64le",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.s390x",
"openSUSE Tumbleweed:distrobuilder-3.2-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-25T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15046-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "docker-28.1.1_ce-16.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the docker-28.1.1_ce-16.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15046",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15046-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "docker-28.1.1_ce-16.1 on GA media",
"tracking": {
"current_release_date": "2025-05-02T00:00:00Z",
"generator": {
"date": "2025-05-02T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15046-1",
"initial_release_date": "2025-05-02T00:00:00Z",
"revision_history": [
{
"date": "2025-05-02T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "docker-28.1.1_ce-16.1.aarch64",
"product": {
"name": "docker-28.1.1_ce-16.1.aarch64",
"product_id": "docker-28.1.1_ce-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-bash-completion-28.1.1_ce-16.1.aarch64",
"product": {
"name": "docker-bash-completion-28.1.1_ce-16.1.aarch64",
"product_id": "docker-bash-completion-28.1.1_ce-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-buildx-0.23.0-16.1.aarch64",
"product": {
"name": "docker-buildx-0.23.0-16.1.aarch64",
"product_id": "docker-buildx-0.23.0-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.1.1_ce-16.1.aarch64",
"product": {
"name": "docker-fish-completion-28.1.1_ce-16.1.aarch64",
"product_id": "docker-fish-completion-28.1.1_ce-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"product": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"product_id": "docker-rootless-extras-28.1.1_ce-16.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"product": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"product_id": "docker-zsh-completion-28.1.1_ce-16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.1.1_ce-16.1.ppc64le",
"product": {
"name": "docker-28.1.1_ce-16.1.ppc64le",
"product_id": "docker-28.1.1_ce-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"product": {
"name": "docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"product_id": "docker-bash-completion-28.1.1_ce-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-buildx-0.23.0-16.1.ppc64le",
"product": {
"name": "docker-buildx-0.23.0-16.1.ppc64le",
"product_id": "docker-buildx-0.23.0-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"product": {
"name": "docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"product_id": "docker-fish-completion-28.1.1_ce-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"product": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"product_id": "docker-rootless-extras-28.1.1_ce-16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"product": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"product_id": "docker-zsh-completion-28.1.1_ce-16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.1.1_ce-16.1.s390x",
"product": {
"name": "docker-28.1.1_ce-16.1.s390x",
"product_id": "docker-28.1.1_ce-16.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-bash-completion-28.1.1_ce-16.1.s390x",
"product": {
"name": "docker-bash-completion-28.1.1_ce-16.1.s390x",
"product_id": "docker-bash-completion-28.1.1_ce-16.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-buildx-0.23.0-16.1.s390x",
"product": {
"name": "docker-buildx-0.23.0-16.1.s390x",
"product_id": "docker-buildx-0.23.0-16.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.1.1_ce-16.1.s390x",
"product": {
"name": "docker-fish-completion-28.1.1_ce-16.1.s390x",
"product_id": "docker-fish-completion-28.1.1_ce-16.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.1.1_ce-16.1.s390x",
"product": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.s390x",
"product_id": "docker-rootless-extras-28.1.1_ce-16.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.1.1_ce-16.1.s390x",
"product": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.s390x",
"product_id": "docker-zsh-completion-28.1.1_ce-16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.1.1_ce-16.1.x86_64",
"product": {
"name": "docker-28.1.1_ce-16.1.x86_64",
"product_id": "docker-28.1.1_ce-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-bash-completion-28.1.1_ce-16.1.x86_64",
"product": {
"name": "docker-bash-completion-28.1.1_ce-16.1.x86_64",
"product_id": "docker-bash-completion-28.1.1_ce-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-buildx-0.23.0-16.1.x86_64",
"product": {
"name": "docker-buildx-0.23.0-16.1.x86_64",
"product_id": "docker-buildx-0.23.0-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.1.1_ce-16.1.x86_64",
"product": {
"name": "docker-fish-completion-28.1.1_ce-16.1.x86_64",
"product_id": "docker-fish-completion-28.1.1_ce-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"product": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"product_id": "docker-rootless-extras-28.1.1_ce-16.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.1.1_ce-16.1.x86_64",
"product": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.x86_64",
"product_id": "docker-zsh-completion-28.1.1_ce-16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.1.1_ce-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-28.1.1_ce-16.1.aarch64"
},
"product_reference": "docker-28.1.1_ce-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.1.1_ce-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-28.1.1_ce-16.1.ppc64le"
},
"product_reference": "docker-28.1.1_ce-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.1.1_ce-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-28.1.1_ce-16.1.s390x"
},
"product_reference": "docker-28.1.1_ce-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.1.1_ce-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-28.1.1_ce-16.1.x86_64"
},
"product_reference": "docker-28.1.1_ce-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.1.1_ce-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.aarch64"
},
"product_reference": "docker-bash-completion-28.1.1_ce-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.1.1_ce-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.ppc64le"
},
"product_reference": "docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.1.1_ce-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.s390x"
},
"product_reference": "docker-bash-completion-28.1.1_ce-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.1.1_ce-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.x86_64"
},
"product_reference": "docker-bash-completion-28.1.1_ce-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-buildx-0.23.0-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.aarch64"
},
"product_reference": "docker-buildx-0.23.0-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-buildx-0.23.0-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.ppc64le"
},
"product_reference": "docker-buildx-0.23.0-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-buildx-0.23.0-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.s390x"
},
"product_reference": "docker-buildx-0.23.0-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-buildx-0.23.0-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.x86_64"
},
"product_reference": "docker-buildx-0.23.0-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.1.1_ce-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.aarch64"
},
"product_reference": "docker-fish-completion-28.1.1_ce-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.1.1_ce-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.ppc64le"
},
"product_reference": "docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.1.1_ce-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.s390x"
},
"product_reference": "docker-fish-completion-28.1.1_ce-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.1.1_ce-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.x86_64"
},
"product_reference": "docker-fish-completion-28.1.1_ce-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.aarch64"
},
"product_reference": "docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.ppc64le"
},
"product_reference": "docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.s390x"
},
"product_reference": "docker-rootless-extras-28.1.1_ce-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.1.1_ce-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.x86_64"
},
"product_reference": "docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.aarch64"
},
"product_reference": "docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.ppc64le"
},
"product_reference": "docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.s390x"
},
"product_reference": "docker-zsh-completion-28.1.1_ce-16.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-zsh-completion-28.1.1_ce-16.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.x86_64"
},
"product_reference": "docker-zsh-completion-28.1.1_ce-16.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.aarch64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.ppc64le",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.s390x",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.x86_64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.aarch64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.ppc64le",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.s390x",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.x86_64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-bash-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.aarch64",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.ppc64le",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.s390x",
"openSUSE Tumbleweed:docker-buildx-0.23.0-16.1.x86_64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-fish-completion-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-rootless-extras-28.1.1_ce-16.1.x86_64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.aarch64",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.ppc64le",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.s390x",
"openSUSE Tumbleweed:docker-zsh-completion-28.1.1_ce-16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-02T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15171-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grafana-11.6.1+security01-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grafana-11.6.1+security01-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15171",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15171-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-3580 page",
"url": "https://www.suse.com/security/cve/CVE-2025-3580/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-4123 page",
"url": "https://www.suse.com/security/cve/CVE-2025-4123/"
}
],
"title": "grafana-11.6.1+security01-1.1 on GA media",
"tracking": {
"current_release_date": "2025-05-27T00:00:00Z",
"generator": {
"date": "2025-05-27T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15171-1",
"initial_release_date": "2025-05-27T00:00:00Z",
"revision_history": [
{
"date": "2025-05-27T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.1+security01-1.1.aarch64",
"product": {
"name": "grafana-11.6.1+security01-1.1.aarch64",
"product_id": "grafana-11.6.1+security01-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.1+security01-1.1.ppc64le",
"product": {
"name": "grafana-11.6.1+security01-1.1.ppc64le",
"product_id": "grafana-11.6.1+security01-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.1+security01-1.1.s390x",
"product": {
"name": "grafana-11.6.1+security01-1.1.s390x",
"product_id": "grafana-11.6.1+security01-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grafana-11.6.1+security01-1.1.x86_64",
"product": {
"name": "grafana-11.6.1+security01-1.1.x86_64",
"product_id": "grafana-11.6.1+security01-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.1+security01-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64"
},
"product_reference": "grafana-11.6.1+security01-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.1+security01-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le"
},
"product_reference": "grafana-11.6.1+security01-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.1+security01-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x"
},
"product_reference": "grafana-11.6.1+security01-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grafana-11.6.1+security01-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
},
"product_reference": "grafana-11.6.1+security01-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-3580",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-3580"
}
],
"notes": [
{
"category": "general",
"text": "An access control vulnerability was discovered in Grafana OSS where an Organization administrator could permanently delete the Server administrator account. This vulnerability exists in the DELETE /api/org/users/ endpoint.\n\nThe vulnerability can be exploited when:\n\n1. An Organization administrator exists\n\n2. The Server administrator is either:\n\n - Not part of any organization, or\n - Part of the same organization as the Organization administrator\nImpact:\n\n- Organization administrators can permanently delete Server administrator accounts\n\n- If the only Server administrator is deleted, the Grafana instance becomes unmanageable\n\n- No super-user permissions remain in the system\n\n- Affects all users, organizations, and teams managed in the instance\n\nThe vulnerability is particularly serious as it can lead to a complete loss of administrative control over the Grafana instance.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-3580",
"url": "https://www.suse.com/security/cve/CVE-2025-3580"
},
{
"category": "external",
"summary": "SUSE Bug 1243672 for CVE-2025-3580",
"url": "https://bugzilla.suse.com/1243672"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-3580"
},
{
"cve": "CVE-2025-4123",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-4123"
}
],
"notes": [
{
"category": "general",
"text": "A cross-site scripting (XSS) vulnerability exists in Grafana caused by combining a client path traversal and open redirect. This allows attackers to redirect users to a website that hosts a frontend plugin that will execute arbitrary JavaScript. This vulnerability does not require editor permissions and if anonymous access is enabled, the XSS will work. If the Grafana Image Renderer plugin is installed, it is possible to exploit the open redirect to achieve a full read SSRF.\n\nThe default Content-Security-Policy (CSP) in Grafana will block the XSS though the `connect-src` directive.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-4123",
"url": "https://www.suse.com/security/cve/CVE-2025-4123"
},
{
"category": "external",
"summary": "SUSE Bug 1243714 for CVE-2025-4123",
"url": "https://bugzilla.suse.com/1243714"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.aarch64",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.ppc64le",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.s390x",
"openSUSE Tumbleweed:grafana-11.6.1+security01-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-27T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-4123"
}
]
}
opensuse-su-2025:15462-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "go-sendxmpp-0.15.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the go-sendxmpp-0.15.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15462",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15462-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "go-sendxmpp-0.15.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-19T00:00:00Z",
"generator": {
"date": "2025-08-19T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15462-1",
"initial_release_date": "2025-08-19T00:00:00Z",
"revision_history": [
{
"date": "2025-08-19T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "go-sendxmpp-0.15.0-1.1.aarch64",
"product": {
"name": "go-sendxmpp-0.15.0-1.1.aarch64",
"product_id": "go-sendxmpp-0.15.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "go-sendxmpp-0.15.0-1.1.ppc64le",
"product": {
"name": "go-sendxmpp-0.15.0-1.1.ppc64le",
"product_id": "go-sendxmpp-0.15.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "go-sendxmpp-0.15.0-1.1.s390x",
"product": {
"name": "go-sendxmpp-0.15.0-1.1.s390x",
"product_id": "go-sendxmpp-0.15.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "go-sendxmpp-0.15.0-1.1.x86_64",
"product": {
"name": "go-sendxmpp-0.15.0-1.1.x86_64",
"product_id": "go-sendxmpp-0.15.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "go-sendxmpp-0.15.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.aarch64"
},
"product_reference": "go-sendxmpp-0.15.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-sendxmpp-0.15.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.ppc64le"
},
"product_reference": "go-sendxmpp-0.15.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-sendxmpp-0.15.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.s390x"
},
"product_reference": "go-sendxmpp-0.15.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "go-sendxmpp-0.15.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.x86_64"
},
"product_reference": "go-sendxmpp-0.15.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.aarch64",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.ppc64le",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.s390x",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.aarch64",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.ppc64le",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.s390x",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.aarch64",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.ppc64le",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.s390x",
"openSUSE Tumbleweed:go-sendxmpp-0.15.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-19T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15036-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "glow-2.1.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the glow-2.1.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15036",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15036-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:15036-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPKEZWS6JMWB5YHJ6IJNYFNNGZGXQM55/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:15036-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QPKEZWS6JMWB5YHJ6IJNYFNNGZGXQM55/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "glow-2.1.0-2.1 on GA media",
"tracking": {
"current_release_date": "2025-04-27T00:00:00Z",
"generator": {
"date": "2025-04-27T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15036-1",
"initial_release_date": "2025-04-27T00:00:00Z",
"revision_history": [
{
"date": "2025-04-27T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "glow-2.1.0-2.1.aarch64",
"product": {
"name": "glow-2.1.0-2.1.aarch64",
"product_id": "glow-2.1.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "glow-bash-completion-2.1.0-2.1.aarch64",
"product": {
"name": "glow-bash-completion-2.1.0-2.1.aarch64",
"product_id": "glow-bash-completion-2.1.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "glow-fish-completion-2.1.0-2.1.aarch64",
"product": {
"name": "glow-fish-completion-2.1.0-2.1.aarch64",
"product_id": "glow-fish-completion-2.1.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "glow-zsh-completion-2.1.0-2.1.aarch64",
"product": {
"name": "glow-zsh-completion-2.1.0-2.1.aarch64",
"product_id": "glow-zsh-completion-2.1.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "glow-2.1.0-2.1.ppc64le",
"product": {
"name": "glow-2.1.0-2.1.ppc64le",
"product_id": "glow-2.1.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glow-bash-completion-2.1.0-2.1.ppc64le",
"product": {
"name": "glow-bash-completion-2.1.0-2.1.ppc64le",
"product_id": "glow-bash-completion-2.1.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glow-fish-completion-2.1.0-2.1.ppc64le",
"product": {
"name": "glow-fish-completion-2.1.0-2.1.ppc64le",
"product_id": "glow-fish-completion-2.1.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "glow-zsh-completion-2.1.0-2.1.ppc64le",
"product": {
"name": "glow-zsh-completion-2.1.0-2.1.ppc64le",
"product_id": "glow-zsh-completion-2.1.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "glow-2.1.0-2.1.s390x",
"product": {
"name": "glow-2.1.0-2.1.s390x",
"product_id": "glow-2.1.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "glow-bash-completion-2.1.0-2.1.s390x",
"product": {
"name": "glow-bash-completion-2.1.0-2.1.s390x",
"product_id": "glow-bash-completion-2.1.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "glow-fish-completion-2.1.0-2.1.s390x",
"product": {
"name": "glow-fish-completion-2.1.0-2.1.s390x",
"product_id": "glow-fish-completion-2.1.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "glow-zsh-completion-2.1.0-2.1.s390x",
"product": {
"name": "glow-zsh-completion-2.1.0-2.1.s390x",
"product_id": "glow-zsh-completion-2.1.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "glow-2.1.0-2.1.x86_64",
"product": {
"name": "glow-2.1.0-2.1.x86_64",
"product_id": "glow-2.1.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "glow-bash-completion-2.1.0-2.1.x86_64",
"product": {
"name": "glow-bash-completion-2.1.0-2.1.x86_64",
"product_id": "glow-bash-completion-2.1.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "glow-fish-completion-2.1.0-2.1.x86_64",
"product": {
"name": "glow-fish-completion-2.1.0-2.1.x86_64",
"product_id": "glow-fish-completion-2.1.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "glow-zsh-completion-2.1.0-2.1.x86_64",
"product": {
"name": "glow-zsh-completion-2.1.0-2.1.x86_64",
"product_id": "glow-zsh-completion-2.1.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-2.1.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-2.1.0-2.1.aarch64"
},
"product_reference": "glow-2.1.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-2.1.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-2.1.0-2.1.ppc64le"
},
"product_reference": "glow-2.1.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-2.1.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-2.1.0-2.1.s390x"
},
"product_reference": "glow-2.1.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-2.1.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-2.1.0-2.1.x86_64"
},
"product_reference": "glow-2.1.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-bash-completion-2.1.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.aarch64"
},
"product_reference": "glow-bash-completion-2.1.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-bash-completion-2.1.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.ppc64le"
},
"product_reference": "glow-bash-completion-2.1.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-bash-completion-2.1.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.s390x"
},
"product_reference": "glow-bash-completion-2.1.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-bash-completion-2.1.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.x86_64"
},
"product_reference": "glow-bash-completion-2.1.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-fish-completion-2.1.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.aarch64"
},
"product_reference": "glow-fish-completion-2.1.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-fish-completion-2.1.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.ppc64le"
},
"product_reference": "glow-fish-completion-2.1.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-fish-completion-2.1.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.s390x"
},
"product_reference": "glow-fish-completion-2.1.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-fish-completion-2.1.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.x86_64"
},
"product_reference": "glow-fish-completion-2.1.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-zsh-completion-2.1.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.aarch64"
},
"product_reference": "glow-zsh-completion-2.1.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-zsh-completion-2.1.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.ppc64le"
},
"product_reference": "glow-zsh-completion-2.1.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-zsh-completion-2.1.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.s390x"
},
"product_reference": "glow-zsh-completion-2.1.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "glow-zsh-completion-2.1.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.x86_64"
},
"product_reference": "glow-zsh-completion-2.1.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:glow-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:glow-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:glow-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-bash-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-fish-completion-2.1.0-2.1.x86_64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.aarch64",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.ppc64le",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.s390x",
"openSUSE Tumbleweed:glow-zsh-completion-2.1.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-27T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15455-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libecpg6-17.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libecpg6-17.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15455",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15455-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8713 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8713/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8714 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8714/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-8715 page",
"url": "https://www.suse.com/security/cve/CVE-2025-8715/"
}
],
"title": "libecpg6-17.6-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-16T00:00:00Z",
"generator": {
"date": "2025-08-16T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15455-1",
"initial_release_date": "2025-08-16T00:00:00Z",
"revision_history": [
{
"date": "2025-08-16T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libecpg6-17.6-1.1.aarch64",
"product": {
"name": "libecpg6-17.6-1.1.aarch64",
"product_id": "libecpg6-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libecpg6-32bit-17.6-1.1.aarch64",
"product": {
"name": "libecpg6-32bit-17.6-1.1.aarch64",
"product_id": "libecpg6-32bit-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpq5-17.6-1.1.aarch64",
"product": {
"name": "libpq5-17.6-1.1.aarch64",
"product_id": "libpq5-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpq5-32bit-17.6-1.1.aarch64",
"product": {
"name": "libpq5-32bit-17.6-1.1.aarch64",
"product_id": "libpq5-32bit-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-17.6-1.1.aarch64",
"product_id": "postgresql17-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-contrib-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-contrib-17.6-1.1.aarch64",
"product_id": "postgresql17-contrib-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-devel-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-devel-17.6-1.1.aarch64",
"product_id": "postgresql17-devel-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-docs-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-docs-17.6-1.1.aarch64",
"product_id": "postgresql17-docs-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-llvmjit-17.6-1.1.aarch64",
"product_id": "postgresql17-llvmjit-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"product_id": "postgresql17-llvmjit-devel-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-plperl-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-plperl-17.6-1.1.aarch64",
"product_id": "postgresql17-plperl-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-plpython-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-plpython-17.6-1.1.aarch64",
"product_id": "postgresql17-plpython-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-pltcl-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-pltcl-17.6-1.1.aarch64",
"product_id": "postgresql17-pltcl-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-server-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-server-17.6-1.1.aarch64",
"product_id": "postgresql17-server-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-server-devel-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-server-devel-17.6-1.1.aarch64",
"product_id": "postgresql17-server-devel-17.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "postgresql17-test-17.6-1.1.aarch64",
"product": {
"name": "postgresql17-test-17.6-1.1.aarch64",
"product_id": "postgresql17-test-17.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libecpg6-17.6-1.1.ppc64le",
"product": {
"name": "libecpg6-17.6-1.1.ppc64le",
"product_id": "libecpg6-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libecpg6-32bit-17.6-1.1.ppc64le",
"product": {
"name": "libecpg6-32bit-17.6-1.1.ppc64le",
"product_id": "libecpg6-32bit-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpq5-17.6-1.1.ppc64le",
"product": {
"name": "libpq5-17.6-1.1.ppc64le",
"product_id": "libpq5-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpq5-32bit-17.6-1.1.ppc64le",
"product": {
"name": "libpq5-32bit-17.6-1.1.ppc64le",
"product_id": "libpq5-32bit-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-17.6-1.1.ppc64le",
"product_id": "postgresql17-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-contrib-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-contrib-17.6-1.1.ppc64le",
"product_id": "postgresql17-contrib-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-devel-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-devel-17.6-1.1.ppc64le",
"product_id": "postgresql17-devel-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-docs-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-docs-17.6-1.1.ppc64le",
"product_id": "postgresql17-docs-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-llvmjit-17.6-1.1.ppc64le",
"product_id": "postgresql17-llvmjit-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"product_id": "postgresql17-llvmjit-devel-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-plperl-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-plperl-17.6-1.1.ppc64le",
"product_id": "postgresql17-plperl-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-plpython-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-plpython-17.6-1.1.ppc64le",
"product_id": "postgresql17-plpython-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-pltcl-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-pltcl-17.6-1.1.ppc64le",
"product_id": "postgresql17-pltcl-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-server-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-server-17.6-1.1.ppc64le",
"product_id": "postgresql17-server-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-server-devel-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-server-devel-17.6-1.1.ppc64le",
"product_id": "postgresql17-server-devel-17.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "postgresql17-test-17.6-1.1.ppc64le",
"product": {
"name": "postgresql17-test-17.6-1.1.ppc64le",
"product_id": "postgresql17-test-17.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libecpg6-17.6-1.1.s390x",
"product": {
"name": "libecpg6-17.6-1.1.s390x",
"product_id": "libecpg6-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libecpg6-32bit-17.6-1.1.s390x",
"product": {
"name": "libecpg6-32bit-17.6-1.1.s390x",
"product_id": "libecpg6-32bit-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpq5-17.6-1.1.s390x",
"product": {
"name": "libpq5-17.6-1.1.s390x",
"product_id": "libpq5-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpq5-32bit-17.6-1.1.s390x",
"product": {
"name": "libpq5-32bit-17.6-1.1.s390x",
"product_id": "libpq5-32bit-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-17.6-1.1.s390x",
"product": {
"name": "postgresql17-17.6-1.1.s390x",
"product_id": "postgresql17-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-contrib-17.6-1.1.s390x",
"product": {
"name": "postgresql17-contrib-17.6-1.1.s390x",
"product_id": "postgresql17-contrib-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-devel-17.6-1.1.s390x",
"product": {
"name": "postgresql17-devel-17.6-1.1.s390x",
"product_id": "postgresql17-devel-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-docs-17.6-1.1.s390x",
"product": {
"name": "postgresql17-docs-17.6-1.1.s390x",
"product_id": "postgresql17-docs-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-17.6-1.1.s390x",
"product": {
"name": "postgresql17-llvmjit-17.6-1.1.s390x",
"product_id": "postgresql17-llvmjit-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-devel-17.6-1.1.s390x",
"product": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.s390x",
"product_id": "postgresql17-llvmjit-devel-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-plperl-17.6-1.1.s390x",
"product": {
"name": "postgresql17-plperl-17.6-1.1.s390x",
"product_id": "postgresql17-plperl-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-plpython-17.6-1.1.s390x",
"product": {
"name": "postgresql17-plpython-17.6-1.1.s390x",
"product_id": "postgresql17-plpython-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-pltcl-17.6-1.1.s390x",
"product": {
"name": "postgresql17-pltcl-17.6-1.1.s390x",
"product_id": "postgresql17-pltcl-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-server-17.6-1.1.s390x",
"product": {
"name": "postgresql17-server-17.6-1.1.s390x",
"product_id": "postgresql17-server-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-server-devel-17.6-1.1.s390x",
"product": {
"name": "postgresql17-server-devel-17.6-1.1.s390x",
"product_id": "postgresql17-server-devel-17.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "postgresql17-test-17.6-1.1.s390x",
"product": {
"name": "postgresql17-test-17.6-1.1.s390x",
"product_id": "postgresql17-test-17.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libecpg6-17.6-1.1.x86_64",
"product": {
"name": "libecpg6-17.6-1.1.x86_64",
"product_id": "libecpg6-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libecpg6-32bit-17.6-1.1.x86_64",
"product": {
"name": "libecpg6-32bit-17.6-1.1.x86_64",
"product_id": "libecpg6-32bit-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpq5-17.6-1.1.x86_64",
"product": {
"name": "libpq5-17.6-1.1.x86_64",
"product_id": "libpq5-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpq5-32bit-17.6-1.1.x86_64",
"product": {
"name": "libpq5-32bit-17.6-1.1.x86_64",
"product_id": "libpq5-32bit-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-17.6-1.1.x86_64",
"product_id": "postgresql17-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-contrib-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-contrib-17.6-1.1.x86_64",
"product_id": "postgresql17-contrib-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-devel-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-devel-17.6-1.1.x86_64",
"product_id": "postgresql17-devel-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-docs-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-docs-17.6-1.1.x86_64",
"product_id": "postgresql17-docs-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-llvmjit-17.6-1.1.x86_64",
"product_id": "postgresql17-llvmjit-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"product_id": "postgresql17-llvmjit-devel-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-plperl-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-plperl-17.6-1.1.x86_64",
"product_id": "postgresql17-plperl-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-plpython-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-plpython-17.6-1.1.x86_64",
"product_id": "postgresql17-plpython-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-pltcl-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-pltcl-17.6-1.1.x86_64",
"product_id": "postgresql17-pltcl-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-server-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-server-17.6-1.1.x86_64",
"product_id": "postgresql17-server-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-server-devel-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-server-devel-17.6-1.1.x86_64",
"product_id": "postgresql17-server-devel-17.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "postgresql17-test-17.6-1.1.x86_64",
"product": {
"name": "postgresql17-test-17.6-1.1.x86_64",
"product_id": "postgresql17-test-17.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64"
},
"product_reference": "libecpg6-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le"
},
"product_reference": "libecpg6-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x"
},
"product_reference": "libecpg6-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64"
},
"product_reference": "libecpg6-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-32bit-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64"
},
"product_reference": "libecpg6-32bit-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-32bit-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le"
},
"product_reference": "libecpg6-32bit-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-32bit-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x"
},
"product_reference": "libecpg6-32bit-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libecpg6-32bit-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64"
},
"product_reference": "libecpg6-32bit-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64"
},
"product_reference": "libpq5-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le"
},
"product_reference": "libpq5-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-17.6-1.1.s390x"
},
"product_reference": "libpq5-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64"
},
"product_reference": "libpq5-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-32bit-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64"
},
"product_reference": "libpq5-32bit-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-32bit-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le"
},
"product_reference": "libpq5-32bit-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-32bit-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x"
},
"product_reference": "libpq5-32bit-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpq5-32bit-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64"
},
"product_reference": "libpq5-32bit-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x"
},
"product_reference": "postgresql17-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-contrib-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-contrib-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-contrib-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-contrib-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-contrib-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x"
},
"product_reference": "postgresql17-contrib-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-contrib-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-contrib-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-devel-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-devel-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-devel-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-devel-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-devel-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x"
},
"product_reference": "postgresql17-devel-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-devel-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-devel-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-docs-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-docs-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-docs-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-docs-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-docs-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x"
},
"product_reference": "postgresql17-docs-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-docs-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-docs-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-llvmjit-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-llvmjit-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x"
},
"product_reference": "postgresql17-llvmjit-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-llvmjit-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x"
},
"product_reference": "postgresql17-llvmjit-devel-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-llvmjit-devel-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plperl-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-plperl-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plperl-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-plperl-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plperl-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x"
},
"product_reference": "postgresql17-plperl-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plperl-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-plperl-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plpython-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-plpython-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plpython-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-plpython-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plpython-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x"
},
"product_reference": "postgresql17-plpython-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-plpython-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-plpython-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-pltcl-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-pltcl-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-pltcl-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-pltcl-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-pltcl-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x"
},
"product_reference": "postgresql17-pltcl-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-pltcl-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-pltcl-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-server-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-server-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x"
},
"product_reference": "postgresql17-server-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-server-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-devel-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-server-devel-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-devel-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-server-devel-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-devel-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x"
},
"product_reference": "postgresql17-server-devel-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-server-devel-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-server-devel-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-test-17.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64"
},
"product_reference": "postgresql17-test-17.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-test-17.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le"
},
"product_reference": "postgresql17-test-17.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-test-17.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x"
},
"product_reference": "postgresql17-test-17.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postgresql17-test-17.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
},
"product_reference": "postgresql17-test-17.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-8713",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8713"
}
],
"notes": [
{
"category": "general",
"text": "PostgreSQL optimizer statistics allow a user to read sampled data within a view that the user cannot access. Separately, statistics allow a user to read sampled data that a row security policy intended to hide. PostgreSQL maintains statistics for tables by sampling data available in columns; this data is consulted during the query planning process. Prior to this release, a user could craft a leaky operator that bypassed view access control lists (ACLs) and bypassed row security policies in partitioning or table inheritance hierarchies. Reachable statistics data notably included histograms and most-common-values lists. CVE-2017-7484 and CVE-2019-10130 intended to close this class of vulnerability, but this gap remained. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8713",
"url": "https://www.suse.com/security/cve/CVE-2025-8713"
},
{
"category": "external",
"summary": "SUSE Bug 1248120 for CVE-2025-8713",
"url": "https://bugzilla.suse.com/1248120"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-16T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-8713"
},
{
"cve": "CVE-2025-8714",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8714"
}
],
"notes": [
{
"category": "general",
"text": "Untrusted data inclusion in pg_dump in PostgreSQL allows a malicious superuser of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands. pg_dumpall is also affected. pg_restore is affected when used to generate a plain-format dump. This is similar to MySQL CVE-2024-21096. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8714",
"url": "https://www.suse.com/security/cve/CVE-2025-8714"
},
{
"category": "external",
"summary": "SUSE Bug 1248122 for CVE-2025-8714",
"url": "https://bugzilla.suse.com/1248122"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-8714"
},
{
"cve": "CVE-2025-8715",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-8715"
}
],
"notes": [
{
"category": "general",
"text": "Improper neutralization of newlines in pg_dump in PostgreSQL allows a user of the origin server to inject arbitrary code for restore-time execution as the client operating system account running psql to restore the dump, via psql meta-commands inside a purpose-crafted object name. The same attacks can achieve SQL injection as a superuser of the restore target server. pg_dumpall, pg_restore, and pg_upgrade are also affected. Versions before PostgreSQL 17.6, 16.10, 15.14, 14.19, and 13.22 are affected. Versions before 11.20 are unaffected. CVE-2012-0868 had fixed this class of problem, but version 11.20 reintroduced it.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-8715",
"url": "https://www.suse.com/security/cve/CVE-2025-8715"
},
{
"category": "external",
"summary": "SUSE Bug 1248119 for CVE-2025-8715",
"url": "https://bugzilla.suse.com/1248119"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libecpg6-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libecpg6-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-17.6-1.1.x86_64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.s390x",
"openSUSE Tumbleweed:libpq5-32bit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-contrib-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-docs-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-llvmjit-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plperl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-plpython-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-pltcl-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-server-devel-17.6-1.1.x86_64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.aarch64",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.ppc64le",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.s390x",
"openSUSE Tumbleweed:postgresql17-test-17.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-16T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-8715"
}
]
}
opensuse-su-2025:15034-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "subfinder-2.7.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the subfinder-2.7.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15034",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15034-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:15034-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJN6I53PLG7NO5USQWWJUIVQTZDQDRHC/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:15034-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/IJN6I53PLG7NO5USQWWJUIVQTZDQDRHC/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "subfinder-2.7.0-3.1 on GA media",
"tracking": {
"current_release_date": "2025-04-26T00:00:00Z",
"generator": {
"date": "2025-04-26T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15034-1",
"initial_release_date": "2025-04-26T00:00:00Z",
"revision_history": [
{
"date": "2025-04-26T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "subfinder-2.7.0-3.1.aarch64",
"product": {
"name": "subfinder-2.7.0-3.1.aarch64",
"product_id": "subfinder-2.7.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "subfinder-2.7.0-3.1.ppc64le",
"product": {
"name": "subfinder-2.7.0-3.1.ppc64le",
"product_id": "subfinder-2.7.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "subfinder-2.7.0-3.1.s390x",
"product": {
"name": "subfinder-2.7.0-3.1.s390x",
"product_id": "subfinder-2.7.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "subfinder-2.7.0-3.1.x86_64",
"product": {
"name": "subfinder-2.7.0-3.1.x86_64",
"product_id": "subfinder-2.7.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "subfinder-2.7.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:subfinder-2.7.0-3.1.aarch64"
},
"product_reference": "subfinder-2.7.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "subfinder-2.7.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:subfinder-2.7.0-3.1.ppc64le"
},
"product_reference": "subfinder-2.7.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "subfinder-2.7.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:subfinder-2.7.0-3.1.s390x"
},
"product_reference": "subfinder-2.7.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "subfinder-2.7.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:subfinder-2.7.0-3.1.x86_64"
},
"product_reference": "subfinder-2.7.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.aarch64",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.ppc64le",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.s390x",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.aarch64",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.ppc64le",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.s390x",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.aarch64",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.ppc64le",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.s390x",
"openSUSE Tumbleweed:subfinder-2.7.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-26T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15236-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kubernetes1.32-apiserver-1.32.6-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kubernetes1.32-apiserver-1.32.6-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15236",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15236-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "kubernetes1.32-apiserver-1.32.6-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15236-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-apiserver-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-client-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-client-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-client-common-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-controller-manager-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-kubeadm-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-kubelet-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-proxy-1.32.6-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"product": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"product_id": "kubernetes1.32-scheduler-1.32.6-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-apiserver-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-client-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-client-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-client-common-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-kubelet-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-proxy-1.32.6-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"product": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"product_id": "kubernetes1.32-scheduler-1.32.6-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-apiserver-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-client-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-client-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-common-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-client-common-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-controller-manager-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-kubeadm-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-kubelet-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-kubelet-common-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-proxy-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-proxy-1.32.6-1.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"product": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"product_id": "kubernetes1.32-scheduler-1.32.6-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-apiserver-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-client-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-client-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-client-common-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-controller-manager-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-kubeadm-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-kubelet-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-proxy-1.32.6-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.32-scheduler-1.32.6-1.1.x86_64",
"product": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.x86_64",
"product_id": "kubernetes1.32-scheduler-1.32.6-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-apiserver-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-client-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-client-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-client-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-client-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-client-common-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-common-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-controller-manager-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubeadm-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-proxy-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-proxy-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.aarch64"
},
"product_reference": "kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.ppc64le"
},
"product_reference": "kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.s390x"
},
"product_reference": "kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.32-scheduler-1.32.6-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.x86_64"
},
"product_reference": "kubernetes1.32-scheduler-1.32.6-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-apiserver-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-bash-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-client-fish-completion-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-controller-manager-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubeadm-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-kubelet-common-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-proxy-1.32.6-1.1.x86_64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.aarch64",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.ppc64le",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.s390x",
"openSUSE Tumbleweed:kubernetes1.32-scheduler-1.32.6-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15047-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "hauler-1.2.4-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the hauler-1.2.4-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15047",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15047-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "hauler-1.2.4-1.1 on GA media",
"tracking": {
"current_release_date": "2025-05-02T00:00:00Z",
"generator": {
"date": "2025-05-02T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15047-1",
"initial_release_date": "2025-05-02T00:00:00Z",
"revision_history": [
{
"date": "2025-05-02T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "hauler-1.2.4-1.1.aarch64",
"product": {
"name": "hauler-1.2.4-1.1.aarch64",
"product_id": "hauler-1.2.4-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "hauler-1.2.4-1.1.ppc64le",
"product": {
"name": "hauler-1.2.4-1.1.ppc64le",
"product_id": "hauler-1.2.4-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "hauler-1.2.4-1.1.s390x",
"product": {
"name": "hauler-1.2.4-1.1.s390x",
"product_id": "hauler-1.2.4-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "hauler-1.2.4-1.1.x86_64",
"product": {
"name": "hauler-1.2.4-1.1.x86_64",
"product_id": "hauler-1.2.4-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "hauler-1.2.4-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:hauler-1.2.4-1.1.aarch64"
},
"product_reference": "hauler-1.2.4-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hauler-1.2.4-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:hauler-1.2.4-1.1.ppc64le"
},
"product_reference": "hauler-1.2.4-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hauler-1.2.4-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:hauler-1.2.4-1.1.s390x"
},
"product_reference": "hauler-1.2.4-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "hauler-1.2.4-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:hauler-1.2.4-1.1.x86_64"
},
"product_reference": "hauler-1.2.4-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:hauler-1.2.4-1.1.aarch64",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.s390x",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:hauler-1.2.4-1.1.aarch64",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.s390x",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:hauler-1.2.4-1.1.aarch64",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.ppc64le",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.s390x",
"openSUSE Tumbleweed:hauler-1.2.4-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-02T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15008-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "govulncheck-vulndb-0.0.20250416T165455-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the govulncheck-vulndb-0.0.20250416T165455-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15008",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15008-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "govulncheck-vulndb-0.0.20250416T165455-1.1 on GA media",
"tracking": {
"current_release_date": "2025-04-17T00:00:00Z",
"generator": {
"date": "2025-04-17T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15008-1",
"initial_release_date": "2025-04-17T00:00:00Z",
"revision_history": [
{
"date": "2025-04-17T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"product": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"product_id": "govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"product": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"product_id": "govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"product": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"product_id": "govulncheck-vulndb-0.0.20250416T165455-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64",
"product": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64",
"product_id": "govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64"
},
"product_reference": "govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le"
},
"product_reference": "govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.s390x"
},
"product_reference": "govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64"
},
"product_reference": "govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.aarch64",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.ppc64le",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.s390x",
"openSUSE Tumbleweed:govulncheck-vulndb-0.0.20250416T165455-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-04-17T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15454-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "trivy-0.65.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the trivy-0.65.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15454",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15454-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22868 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22869 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-30204 page",
"url": "https://www.suse.com/security/cve/CVE-2025-30204/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47291 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47291/"
}
],
"title": "trivy-0.65.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-08-15T00:00:00Z",
"generator": {
"date": "2025-08-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15454-1",
"initial_release_date": "2025-08-15T00:00:00Z",
"revision_history": [
{
"date": "2025-08-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "trivy-0.65.0-1.1.aarch64",
"product": {
"name": "trivy-0.65.0-1.1.aarch64",
"product_id": "trivy-0.65.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "trivy-0.65.0-1.1.ppc64le",
"product": {
"name": "trivy-0.65.0-1.1.ppc64le",
"product_id": "trivy-0.65.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "trivy-0.65.0-1.1.s390x",
"product": {
"name": "trivy-0.65.0-1.1.s390x",
"product_id": "trivy-0.65.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "trivy-0.65.0-1.1.x86_64",
"product": {
"name": "trivy-0.65.0-1.1.x86_64",
"product_id": "trivy-0.65.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "trivy-0.65.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64"
},
"product_reference": "trivy-0.65.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "trivy-0.65.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le"
},
"product_reference": "trivy-0.65.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "trivy-0.65.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x"
},
"product_reference": "trivy-0.65.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "trivy-0.65.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
},
"product_reference": "trivy-0.65.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22868"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22868",
"url": "https://www.suse.com/security/cve/CVE-2025-22868"
},
{
"category": "external",
"summary": "SUSE Bug 1239185 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239185"
},
{
"category": "external",
"summary": "SUSE Bug 1239186 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22868"
},
{
"cve": "CVE-2025-22869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22869"
}
],
"notes": [
{
"category": "general",
"text": "SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22869",
"url": "https://www.suse.com/security/cve/CVE-2025-22869"
},
{
"category": "external",
"summary": "SUSE Bug 1239322 for CVE-2025-22869",
"url": "https://bugzilla.suse.com/1239322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22869"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-30204",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-30204"
}
],
"notes": [
{
"category": "general",
"text": "golang-jwt is a Go implementation of JSON Web Tokens. Starting in version 3.2.0 and prior to versions 5.2.2 and 4.5.2, the function parse.ParseUnverified splits (via a call to strings.Split) its argument (which is untrusted data) on periods. As a result, in the face of a malicious request whose Authorization header consists of Bearer followed by many period characters, a call to that function incurs allocations to the tune of O(n) bytes (where n stands for the length of the function\u0027s argument), with a constant factor of about 16. This issue is fixed in 5.2.2 and 4.5.2.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-30204",
"url": "https://www.suse.com/security/cve/CVE-2025-30204"
},
{
"category": "external",
"summary": "SUSE Bug 1240441 for CVE-2025-30204",
"url": "https://bugzilla.suse.com/1240441"
},
{
"category": "external",
"summary": "SUSE Bug 1240442 for CVE-2025-30204",
"url": "https://bugzilla.suse.com/1240442"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-30204"
},
{
"cve": "CVE-2025-47291",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47291"
}
],
"notes": [
{
"category": "general",
"text": "containerd is an open-source container runtime. A bug was found in the containerd\u0027s CRI implementation where containerd, starting in version 2.0.1 and prior to version 2.0.5, doesn\u0027t put usernamespaced containers under the Kubernetes\u0027 cgroup hierarchy, therefore some Kubernetes limits are not honored. This may cause a denial of service of the Kubernetes node. This bug has been fixed in containerd 2.0.5+ and 2.1.0+. Users should update to these versions to resolve the issue. As a workaround, disable usernamespaced pods in Kubernetes temporarily.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47291",
"url": "https://www.suse.com/security/cve/CVE-2025-47291"
},
{
"category": "external",
"summary": "SUSE Bug 1243632 for CVE-2025-47291",
"url": "https://bugzilla.suse.com/1243632"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:trivy-0.65.0-1.1.aarch64",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.ppc64le",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.s390x",
"openSUSE Tumbleweed:trivy-0.65.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-47291"
}
]
}
opensuse-su-2025:15228-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "helm-3.18.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the helm-3.18.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15228",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15228-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "helm-3.18.3-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15228-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "helm-3.18.3-1.1.aarch64",
"product": {
"name": "helm-3.18.3-1.1.aarch64",
"product_id": "helm-3.18.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.18.3-1.1.aarch64",
"product": {
"name": "helm-bash-completion-3.18.3-1.1.aarch64",
"product_id": "helm-bash-completion-3.18.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.18.3-1.1.aarch64",
"product": {
"name": "helm-fish-completion-3.18.3-1.1.aarch64",
"product_id": "helm-fish-completion-3.18.3-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.18.3-1.1.aarch64",
"product": {
"name": "helm-zsh-completion-3.18.3-1.1.aarch64",
"product_id": "helm-zsh-completion-3.18.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.18.3-1.1.ppc64le",
"product": {
"name": "helm-3.18.3-1.1.ppc64le",
"product_id": "helm-3.18.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.18.3-1.1.ppc64le",
"product": {
"name": "helm-bash-completion-3.18.3-1.1.ppc64le",
"product_id": "helm-bash-completion-3.18.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.18.3-1.1.ppc64le",
"product": {
"name": "helm-fish-completion-3.18.3-1.1.ppc64le",
"product_id": "helm-fish-completion-3.18.3-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.18.3-1.1.ppc64le",
"product": {
"name": "helm-zsh-completion-3.18.3-1.1.ppc64le",
"product_id": "helm-zsh-completion-3.18.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.18.3-1.1.s390x",
"product": {
"name": "helm-3.18.3-1.1.s390x",
"product_id": "helm-3.18.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.18.3-1.1.s390x",
"product": {
"name": "helm-bash-completion-3.18.3-1.1.s390x",
"product_id": "helm-bash-completion-3.18.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.18.3-1.1.s390x",
"product": {
"name": "helm-fish-completion-3.18.3-1.1.s390x",
"product_id": "helm-fish-completion-3.18.3-1.1.s390x"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.18.3-1.1.s390x",
"product": {
"name": "helm-zsh-completion-3.18.3-1.1.s390x",
"product_id": "helm-zsh-completion-3.18.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "helm-3.18.3-1.1.x86_64",
"product": {
"name": "helm-3.18.3-1.1.x86_64",
"product_id": "helm-3.18.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-bash-completion-3.18.3-1.1.x86_64",
"product": {
"name": "helm-bash-completion-3.18.3-1.1.x86_64",
"product_id": "helm-bash-completion-3.18.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-fish-completion-3.18.3-1.1.x86_64",
"product": {
"name": "helm-fish-completion-3.18.3-1.1.x86_64",
"product_id": "helm-fish-completion-3.18.3-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "helm-zsh-completion-3.18.3-1.1.x86_64",
"product": {
"name": "helm-zsh-completion-3.18.3-1.1.x86_64",
"product_id": "helm-zsh-completion-3.18.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.18.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.18.3-1.1.aarch64"
},
"product_reference": "helm-3.18.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.18.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.18.3-1.1.ppc64le"
},
"product_reference": "helm-3.18.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.18.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.18.3-1.1.s390x"
},
"product_reference": "helm-3.18.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-3.18.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-3.18.3-1.1.x86_64"
},
"product_reference": "helm-3.18.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.18.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.aarch64"
},
"product_reference": "helm-bash-completion-3.18.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.18.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.ppc64le"
},
"product_reference": "helm-bash-completion-3.18.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.18.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.s390x"
},
"product_reference": "helm-bash-completion-3.18.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-bash-completion-3.18.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.x86_64"
},
"product_reference": "helm-bash-completion-3.18.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.18.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.aarch64"
},
"product_reference": "helm-fish-completion-3.18.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.18.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.ppc64le"
},
"product_reference": "helm-fish-completion-3.18.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.18.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.s390x"
},
"product_reference": "helm-fish-completion-3.18.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-fish-completion-3.18.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.x86_64"
},
"product_reference": "helm-fish-completion-3.18.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.18.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.aarch64"
},
"product_reference": "helm-zsh-completion-3.18.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.18.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.ppc64le"
},
"product_reference": "helm-zsh-completion-3.18.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.18.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.s390x"
},
"product_reference": "helm-zsh-completion-3.18.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "helm-zsh-completion-3.18.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.x86_64"
},
"product_reference": "helm-zsh-completion-3.18.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:helm-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:helm-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:helm-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-bash-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-fish-completion-3.18.3-1.1.x86_64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.aarch64",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.ppc64le",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.s390x",
"openSUSE Tumbleweed:helm-zsh-completion-3.18.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
opensuse-su-2025:15304-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "traefik-3.4.3-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the traefik-3.4.3-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15304",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15304-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-4533 page",
"url": "https://www.suse.com/security/cve/CVE-2024-4533/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-45338 page",
"url": "https://www.suse.com/security/cve/CVE-2024-45338/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22868 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22868/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22869 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22869/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-27144 page",
"url": "https://www.suse.com/security/cve/CVE-2025-27144/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-47952 page",
"url": "https://www.suse.com/security/cve/CVE-2025-47952/"
}
],
"title": "traefik-3.4.3-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15304-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "traefik-3.4.3-1.1.aarch64",
"product": {
"name": "traefik-3.4.3-1.1.aarch64",
"product_id": "traefik-3.4.3-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik-3.4.3-1.1.ppc64le",
"product": {
"name": "traefik-3.4.3-1.1.ppc64le",
"product_id": "traefik-3.4.3-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik-3.4.3-1.1.s390x",
"product": {
"name": "traefik-3.4.3-1.1.s390x",
"product_id": "traefik-3.4.3-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "traefik-3.4.3-1.1.x86_64",
"product": {
"name": "traefik-3.4.3-1.1.x86_64",
"product_id": "traefik-3.4.3-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik-3.4.3-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64"
},
"product_reference": "traefik-3.4.3-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik-3.4.3-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le"
},
"product_reference": "traefik-3.4.3-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik-3.4.3-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x"
},
"product_reference": "traefik-3.4.3-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "traefik-3.4.3-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
},
"product_reference": "traefik-3.4.3-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-4533",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-4533"
}
],
"notes": [
{
"category": "general",
"text": "The KKProgressbar2 Free WordPress plugin through 1.1.4.2 does not sanitize and escape a parameter before using it in a SQL statement, allowing admin users to perform SQL injection attacks",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-4533",
"url": "https://www.suse.com/security/cve/CVE-2024-4533"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-4533"
},
{
"cve": "CVE-2024-45338",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-45338"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can craft an input to the Parse functions that would be processed non-linearly with respect to its length, resulting in extremely slow parsing. This could cause a denial of service.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-45338",
"url": "https://www.suse.com/security/cve/CVE-2024-45338"
},
{
"category": "external",
"summary": "SUSE Bug 1234794 for CVE-2024-45338",
"url": "https://bugzilla.suse.com/1234794"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2024-45338"
},
{
"cve": "CVE-2025-22868",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22868"
}
],
"notes": [
{
"category": "general",
"text": "An attacker can pass a malicious malformed token which causes unexpected memory to be consumed during parsing.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22868",
"url": "https://www.suse.com/security/cve/CVE-2025-22868"
},
{
"category": "external",
"summary": "SUSE Bug 1239185 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239185"
},
{
"category": "external",
"summary": "SUSE Bug 1239186 for CVE-2025-22868",
"url": "https://bugzilla.suse.com/1239186"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22868"
},
{
"cve": "CVE-2025-22869",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22869"
}
],
"notes": [
{
"category": "general",
"text": "SSH servers which implement file transfer protocols are vulnerable to a denial of service attack from clients which complete the key exchange slowly, or not at all, causing pending content to be read into memory, but never transmitted.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22869",
"url": "https://www.suse.com/security/cve/CVE-2025-22869"
},
{
"category": "external",
"summary": "SUSE Bug 1239322 for CVE-2025-22869",
"url": "https://bugzilla.suse.com/1239322"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-22869"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-27144",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-27144"
}
],
"notes": [
{
"category": "general",
"text": "Go JOSE provides an implementation of the Javascript Object Signing and Encryption set of standards in Go, including support for JSON Web Encryption (JWE), JSON Web Signature (JWS), and JSON Web Token (JWT) standards. In versions on the 4.x branch prior to version 4.0.5, when parsing compact JWS or JWE input, Go JOSE could use excessive memory. The code used strings.Split(token, \".\") to split JWT tokens, which is vulnerable to excessive memory consumption when processing maliciously crafted tokens with a large number of `.` characters. An attacker could exploit this by sending numerous malformed tokens, leading to memory exhaustion and a Denial of Service. Version 4.0.5 fixes this issue. As a workaround, applications could pre-validate that payloads passed to Go JOSE do not contain an excessive number of `.` characters.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-27144",
"url": "https://www.suse.com/security/cve/CVE-2025-27144"
},
{
"category": "external",
"summary": "SUSE Bug 1237608 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237608"
},
{
"category": "external",
"summary": "SUSE Bug 1237609 for CVE-2025-27144",
"url": "https://bugzilla.suse.com/1237609"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2025-27144"
},
{
"cve": "CVE-2025-47952",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-47952"
}
],
"notes": [
{
"category": "general",
"text": "Traefik (pronounced traffic) is an HTTP reverse proxy and load balancer. Prior to versions 2.11.25 and 3.4.1, there is a potential vulnerability in Traefik managing the requests using a PathPrefix, Path or PathRegex matcher. When Traefik is configured to route the requests to a backend using a matcher based on the path, if the URL contains a URL encoded string in its path, it\u0027s possible to target a backend, exposed using another router, by-passing the middlewares chain. This issue has been patched in versions 2.11.25 and 3.4.1.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-47952",
"url": "https://www.suse.com/security/cve/CVE-2025-47952"
},
{
"category": "external",
"summary": "SUSE Bug 1243818 for CVE-2025-47952",
"url": "https://bugzilla.suse.com/1243818"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:traefik-3.4.3-1.1.aarch64",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.ppc64le",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.s390x",
"openSUSE Tumbleweed:traefik-3.4.3-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "low"
}
],
"title": "CVE-2025-47952"
}
]
}
opensuse-su-2025:15207-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "alloy-1.9.1-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the alloy-1.9.1-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15207",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15207-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-46327 page",
"url": "https://www.suse.com/security/cve/CVE-2025-46327/"
}
],
"title": "alloy-1.9.1-1.1 on GA media",
"tracking": {
"current_release_date": "2025-07-03T00:00:00Z",
"generator": {
"date": "2025-07-03T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15207-1",
"initial_release_date": "2025-07-03T00:00:00Z",
"revision_history": [
{
"date": "2025-07-03T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "alloy-1.9.1-1.1.aarch64",
"product": {
"name": "alloy-1.9.1-1.1.aarch64",
"product_id": "alloy-1.9.1-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "alloy-1.9.1-1.1.ppc64le",
"product": {
"name": "alloy-1.9.1-1.1.ppc64le",
"product_id": "alloy-1.9.1-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "alloy-1.9.1-1.1.s390x",
"product": {
"name": "alloy-1.9.1-1.1.s390x",
"product_id": "alloy-1.9.1-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "alloy-1.9.1-1.1.x86_64",
"product": {
"name": "alloy-1.9.1-1.1.x86_64",
"product_id": "alloy-1.9.1-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "alloy-1.9.1-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64"
},
"product_reference": "alloy-1.9.1-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "alloy-1.9.1-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le"
},
"product_reference": "alloy-1.9.1-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "alloy-1.9.1-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x"
},
"product_reference": "alloy-1.9.1-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "alloy-1.9.1-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
},
"product_reference": "alloy-1.9.1-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
},
{
"cve": "CVE-2025-46327",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-46327"
}
],
"notes": [
{
"category": "general",
"text": "gosnowflake is the Snowflake Golang driver. Versions starting from 1.7.0 to before 1.13.3, are vulnerable to a Time-of-Check to Time-of-Use (TOCTOU) race condition. When using the Easy Logging feature on Linux and macOS, the Driver reads logging configuration from a user-provided file. On Linux and macOS the Driver verifies that the configuration file can be written to only by its owner. That check was vulnerable to a TOCTOU race condition and failed to verify that the file owner matches the user running the Driver. This could allow a local attacker with write access to the configuration file or the directory containing it to overwrite the configuration and gain control over logging level and output location. This issue has been patched in version 1.13.3.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-46327",
"url": "https://www.suse.com/security/cve/CVE-2025-46327"
},
{
"category": "external",
"summary": "SUSE Bug 1242017 for CVE-2025-46327",
"url": "https://bugzilla.suse.com/1242017"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:alloy-1.9.1-1.1.aarch64",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.ppc64le",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.s390x",
"openSUSE Tumbleweed:alloy-1.9.1-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-03T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-46327"
}
]
}
opensuse-su-2025:15147-1
Vulnerability from csaf_opensuse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kubo-0.35.0-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kubo-0.35.0-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15147",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15147-1.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2025:15147-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QA73DOMVV4XIT7C22BBHOSQN2YR3QNWF/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2025:15147-1",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/QA73DOMVV4XIT7C22BBHOSQN2YR3QNWF/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "kubo-0.35.0-1.1 on GA media",
"tracking": {
"current_release_date": "2025-05-22T00:00:00Z",
"generator": {
"date": "2025-05-22T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15147-1",
"initial_release_date": "2025-05-22T00:00:00Z",
"revision_history": [
{
"date": "2025-05-22T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.35.0-1.1.aarch64",
"product": {
"name": "kubo-0.35.0-1.1.aarch64",
"product_id": "kubo-0.35.0-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.35.0-1.1.ppc64le",
"product": {
"name": "kubo-0.35.0-1.1.ppc64le",
"product_id": "kubo-0.35.0-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.35.0-1.1.s390x",
"product": {
"name": "kubo-0.35.0-1.1.s390x",
"product_id": "kubo-0.35.0-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubo-0.35.0-1.1.x86_64",
"product": {
"name": "kubo-0.35.0-1.1.x86_64",
"product_id": "kubo-0.35.0-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.35.0-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.35.0-1.1.aarch64"
},
"product_reference": "kubo-0.35.0-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.35.0-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.35.0-1.1.ppc64le"
},
"product_reference": "kubo-0.35.0-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.35.0-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.35.0-1.1.s390x"
},
"product_reference": "kubo-0.35.0-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubo-0.35.0-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kubo-0.35.0-1.1.x86_64"
},
"product_reference": "kubo-0.35.0-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kubo-0.35.0-1.1.aarch64",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.s390x",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kubo-0.35.0-1.1.aarch64",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.s390x",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:kubo-0.35.0-1.1.aarch64",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.ppc64le",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.s390x",
"openSUSE Tumbleweed:kubo-0.35.0-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-05-22T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02289-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for docker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for docker fixes the following issues:\n\nUpdate to Docker 28.2.2-ce (bsc#1243833, bsc#1242114):\n\n- CVE-2025-0495: Fixed credential leakage to telemetry endpoints when credentials \n allowed to be set as attribute values in cache-to/cache-from configuration.(bsc#1239765)\n- CVE-2025-22872: golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241830).\n\nOther fixes: \n \n- Update to docker-buildx v0.22.0.\n- Always clear SUSEConnect suse_* secrets when starting containers (bsc#1244035).\n- Disable transparent SUSEConnect support for SLE-16. (jsc#PED-12534)\n- Now that the only blocker for docker-buildx support was removed for SLE-16,\n enable docker-buildx for SLE-16 as well. (jsc#PED-8905)\n- SUSEConnect secrets fails in SLES rootless docker containers (bsc#1240150).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2289,SUSE-SLE-Micro-5.3-2025-2289,SUSE-SLE-Micro-5.4-2025-2289,SUSE-SLE-Micro-5.5-2025-2289,SUSE-SLE-Module-Basesystem-15-SP7-2025-2289,SUSE-SLE-Module-Containers-15-SP6-2025-2289,SUSE-SLE-Module-Containers-15-SP7-2025-2289,SUSE-SUSE-MicroOS-5.1-2025-2289,SUSE-SUSE-MicroOS-5.2-2025-2289,openSUSE-SLE-15.6-2025-2289",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02289-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02289-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502289-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02289-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040684.html"
},
{
"category": "self",
"summary": "SUSE Bug 1239765",
"url": "https://bugzilla.suse.com/1239765"
},
{
"category": "self",
"summary": "SUSE Bug 1240150",
"url": "https://bugzilla.suse.com/1240150"
},
{
"category": "self",
"summary": "SUSE Bug 1241830",
"url": "https://bugzilla.suse.com/1241830"
},
{
"category": "self",
"summary": "SUSE Bug 1242114",
"url": "https://bugzilla.suse.com/1242114"
},
{
"category": "self",
"summary": "SUSE Bug 1243833",
"url": "https://bugzilla.suse.com/1243833"
},
{
"category": "self",
"summary": "SUSE Bug 1244035",
"url": "https://bugzilla.suse.com/1244035"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0495 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for docker",
"tracking": {
"current_release_date": "2025-07-11T11:12:49Z",
"generator": {
"date": "2025-07-11T11:12:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02289-1",
"initial_release_date": "2025-07-11T11:12:49Z",
"revision_history": [
{
"date": "2025-07-11T11:12:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.aarch64",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64",
"product_id": "docker-28.2.2_ce-150000.227.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.i586",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.i586",
"product_id": "docker-28.2.2_ce-150000.227.1.i586"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.i586",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.i586",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.ppc64le",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le",
"product_id": "docker-28.2.2_ce-150000.227.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.s390x",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.s390x",
"product_id": "docker-28.2.2_ce-150000.227.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.x86_64",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64",
"product_id": "docker-28.2.2_ce-150000.227.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp7"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.1",
"product": {
"name": "SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.1"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Module for Containers 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Micro 5.1",
"product_id": "SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-0495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0495"
}
],
"notes": [
{
"category": "general",
"text": "Buildx is a Docker CLI plugin that extends build capabilities using BuildKit.\n\nCache backends support credentials by setting secrets directly as attribute values in cache-to/cache-from configuration. When supplied as user input, these secure values may be inadvertently captured in OpenTelemetry traces as part of the arguments and flags for the traced CLI command. OpenTelemetry traces are also saved in BuildKit daemon\u0027s history records.\n\n\nThis vulnerability does not impact secrets passed to the Github cache backend via environment variables or registry authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0495",
"url": "https://www.suse.com/security/cve/CVE-2025-0495"
},
{
"category": "external",
"summary": "SUSE Bug 1239765 for CVE-2025-0495",
"url": "https://bugzilla.suse.com/1239765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T11:12:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-0495"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.2:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Micro 5.5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP7:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.aarch64",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.ppc64le",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.s390x",
"openSUSE Leap 15.6:docker-28.2.2_ce-150000.227.1.x86_64",
"openSUSE Leap 15.6:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"openSUSE Leap 15.6:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"openSUSE Leap 15.6:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"openSUSE Leap 15.6:docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-11T11:12:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02383-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.26 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2383,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2383,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2383,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2383,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2383,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2383,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2383,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2383,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2383",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02383-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02383-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502383-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02383-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041216.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229008",
"url": "https://bugzilla.suse.com/1229008"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE Bug 1245087",
"url": "https://bugzilla.suse.com/1245087"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.26",
"tracking": {
"current_release_date": "2025-08-14T13:03:07Z",
"generator": {
"date": "2025-08-14T13:03:07Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02383-2",
"initial_release_date": "2025-08-14T13:03:07Z",
"revision_history": [
{
"date": "2025-08-14T13:03:07Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"product_id": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"product_id": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-14T13:03:07Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02336-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.27",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.27 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2336,SUSE-SLE-Module-Containers-15-SP6-2025-2336,openSUSE-SLE-15.6-2025-2336",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02336-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02336-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502336-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02336-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040741.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.27",
"tracking": {
"current_release_date": "2025-07-16T14:50:25Z",
"generator": {
"date": "2025-07-16T14:50:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02336-1",
"initial_release_date": "2025-07-16T14:50:25Z",
"revision_history": [
{
"date": "2025-07-16T14:50:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"product": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"product_id": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"product": {
"name": "kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"product_id": "kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"product": {
"name": "kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"product_id": "kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"product": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"product_id": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"product": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"product_id": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64",
"product": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64",
"product_id": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch"
},
"product_reference": "kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch"
},
"product_reference": "kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64"
},
"product_reference": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le"
},
"product_reference": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x"
},
"product_reference": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64"
},
"product_reference": "kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-apiserver-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-bash-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-client-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-client-fish-completion-1.27.16-150400.9.16.1.noarch",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-controller-manager-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubeadm-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-kubelet-common-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-proxy-1.27.16-150400.9.16.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.s390x",
"openSUSE Leap 15.6:kubernetes1.27-scheduler-1.27.16-150400.9.16.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-16T14:50:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02383-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.26",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.26 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2383,SUSE-SLE-Module-Containers-15-SP6-2025-2383,openSUSE-SLE-15.6-2025-2383",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02383-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02383-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502383-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02383-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040789.html"
},
{
"category": "self",
"summary": "SUSE Bug 1229008",
"url": "https://bugzilla.suse.com/1229008"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE Bug 1245087",
"url": "https://bugzilla.suse.com/1245087"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.26",
"tracking": {
"current_release_date": "2025-07-18T16:44:46Z",
"generator": {
"date": "2025-07-18T16:44:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02383-1",
"initial_release_date": "2025-07-18T16:44:46Z",
"revision_history": [
{
"date": "2025-07-18T16:44:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"product_id": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"product_id": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64",
"product_id": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch"
},
"product_reference": "kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch"
},
"product_reference": "kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-apiserver-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-bash-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-client-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-client-fish-completion-1.26.15-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-controller-manager-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubeadm-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-kubelet-common-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-proxy-1.26.15-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.26-scheduler-1.26.15-150400.9.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-18T16:44:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02350-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.28",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.28 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2350,SUSE-SLE-Module-Containers-15-SP6-2025-2350",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02350-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02350-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502350-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02350-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040764.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.28",
"tracking": {
"current_release_date": "2025-08-01T16:07:53Z",
"generator": {
"date": "2025-08-01T16:07:53Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02350-1",
"initial_release_date": "2025-08-01T16:07:53Z",
"revision_history": [
{
"date": "2025-08-01T16:07:53Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch",
"product": {
"name": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch",
"product_id": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch",
"product": {
"name": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch",
"product_id": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T16:07:53Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:01940-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.23",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.23 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-1940,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-1940,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-1940,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-1940,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-1940",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_01940-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:01940-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202501940-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:01940-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041217.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.23",
"tracking": {
"current_release_date": "2025-08-14T13:02:12Z",
"generator": {
"date": "2025-08-14T13:02:12Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:01940-2",
"initial_release_date": "2025-08-14T13:02:12Z",
"revision_history": [
{
"date": "2025-08-14T13:02:12Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.aarch64",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.aarch64",
"product_id": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-client-bash-completion-1.23.17-150500.3.21.1.noarch",
"product": {
"name": "kubernetes1.23-client-bash-completion-1.23.17-150500.3.21.1.noarch",
"product_id": "kubernetes1.23-client-bash-completion-1.23.17-150500.3.21.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-fish-completion-1.23.17-150500.3.21.1.noarch",
"product": {
"name": "kubernetes1.23-client-fish-completion-1.23.17-150500.3.21.1.noarch",
"product_id": "kubernetes1.23-client-fish-completion-1.23.17-150500.3.21.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.ppc64le",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.ppc64le",
"product_id": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-client-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.s390x",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.s390x",
"product_id": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-apiserver-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-kubelet-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-proxy-1.23.17-150500.3.21.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.x86_64",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.x86_64",
"product_id": "kubernetes1.23-scheduler-1.23.17-150500.3.21.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.s390x"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-1.23.17-150500.3.21.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.23-client-common-1.23.17-150500.3.21.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-14T13:02:12Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02350-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.28",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.28 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2350,SUSE-SLE-Module-Containers-15-SP6-2025-2350,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2350,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2350,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2350,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2350,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2350,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2350,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2350,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2350",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02350-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02350-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502350-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02350-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041007.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.28",
"tracking": {
"current_release_date": "2025-08-01T16:07:50Z",
"generator": {
"date": "2025-08-01T16:07:50Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02350-2",
"initial_release_date": "2025-08-01T16:07:50Z",
"revision_history": [
{
"date": "2025-08-01T16:07:50Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch",
"product": {
"name": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch",
"product_id": "kubernetes1.28-client-bash-completion-1.28.13-150400.9.14.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch",
"product": {
"name": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch",
"product_id": "kubernetes1.28-client-fish-completion-1.28.13-150400.9.14.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-apiserver-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-controller-manager-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubeadm-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubelet-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-kubelet-common-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-proxy-1.28.13-150400.9.14.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64",
"product": {
"name": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64",
"product_id": "kubernetes1.28-scheduler-1.28.13-150400.9.14.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
},
"product_reference": "kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-1.28.13-150400.9.14.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:kubernetes1.28-client-common-1.28.13-150400.9.14.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-01T16:07:50Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02351-1
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.25",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.25 fixes the following issues:\n\n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2351,SUSE-SLE-Module-Containers-15-SP6-2025-2351,openSUSE-SLE-15.6-2025-2351",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02351-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02351-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502351-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02351-1",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040763.html"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.25",
"tracking": {
"current_release_date": "2025-07-17T12:32:49Z",
"generator": {
"date": "2025-07-17T12:32:49Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02351-1",
"initial_release_date": "2025-07-17T12:32:49Z",
"revision_history": [
{
"date": "2025-07-17T12:32:49Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"product": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"product_id": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"product_id": "kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"product": {
"name": "kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"product_id": "kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"product": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"product_id": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"product": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"product_id": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64",
"product": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64",
"product_id": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-containers:15:sp6"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64 as component of SUSE Linux Enterprise Module for Containers 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Containers 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch"
},
"product_reference": "kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch"
},
"product_reference": "kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64"
},
"product_reference": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le"
},
"product_reference": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x"
},
"product_reference": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64"
},
"product_reference": "kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"SUSE Linux Enterprise Module for Containers 15 SP6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-apiserver-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-bash-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-client-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-client-fish-completion-1.25.16-150400.9.22.1.noarch",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-controller-manager-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubeadm-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-kubelet-common-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-proxy-1.25.16-150400.9.22.1.x86_64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.aarch64",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.ppc64le",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.s390x",
"openSUSE Leap 15.6:kubernetes1.25-scheduler-1.25.16-150400.9.22.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-17T12:32:49Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02366-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for docker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for docker fixes the following issues:\n\nUpdate to Docker 28.2.2-ce (bsc#1243833, bsc#1242114):\n\n- CVE-2025-22872: golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241830).\n\nOther bugfixes:\n\n- Always clear SUSEConnect suse_* secrets when starting containers (bsc#1244035).\n- SUSEConnect secrets fails in SLES rootless docker containers (bsc#1240150).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2366,SUSE-SLE-SERVER-12-SP5-LTSS-2025-2366",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02366-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02366-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502366-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02366-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040952.html"
},
{
"category": "self",
"summary": "SUSE Bug 1240150",
"url": "https://bugzilla.suse.com/1240150"
},
{
"category": "self",
"summary": "SUSE Bug 1241830",
"url": "https://bugzilla.suse.com/1241830"
},
{
"category": "self",
"summary": "SUSE Bug 1242114",
"url": "https://bugzilla.suse.com/1242114"
},
{
"category": "self",
"summary": "SUSE Bug 1243833",
"url": "https://bugzilla.suse.com/1243833"
},
{
"category": "self",
"summary": "SUSE Bug 1244035",
"url": "https://bugzilla.suse.com/1244035"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for docker",
"tracking": {
"current_release_date": "2025-07-30T07:52:22Z",
"generator": {
"date": "2025-07-30T07:52:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02366-2",
"initial_release_date": "2025-07-30T07:52:22Z",
"revision_history": [
{
"date": "2025-07-30T07:52:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-98.134.1.aarch64",
"product": {
"name": "docker-28.2.2_ce-98.134.1.aarch64",
"product_id": "docker-28.2.2_ce-98.134.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-98.134.1.i586",
"product": {
"name": "docker-28.2.2_ce-98.134.1.i586",
"product_id": "docker-28.2.2_ce-98.134.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-bash-completion-28.2.2_ce-98.134.1.noarch",
"product": {
"name": "docker-bash-completion-28.2.2_ce-98.134.1.noarch",
"product_id": "docker-bash-completion-28.2.2_ce-98.134.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.2.2_ce-98.134.1.noarch",
"product": {
"name": "docker-fish-completion-28.2.2_ce-98.134.1.noarch",
"product_id": "docker-fish-completion-28.2.2_ce-98.134.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.2.2_ce-98.134.1.noarch",
"product": {
"name": "docker-rootless-extras-28.2.2_ce-98.134.1.noarch",
"product_id": "docker-rootless-extras-28.2.2_ce-98.134.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.2.2_ce-98.134.1.noarch",
"product": {
"name": "docker-zsh-completion-28.2.2_ce-98.134.1.noarch",
"product_id": "docker-zsh-completion-28.2.2_ce-98.134.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-98.134.1.ppc64le",
"product": {
"name": "docker-28.2.2_ce-98.134.1.ppc64le",
"product_id": "docker-28.2.2_ce-98.134.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-98.134.1.s390x",
"product": {
"name": "docker-28.2.2_ce-98.134.1.s390x",
"product_id": "docker-28.2.2_ce-98.134.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-98.134.1.x86_64",
"product": {
"name": "docker-28.2.2_ce-98.134.1.x86_64",
"product_id": "docker-28.2.2_ce-98.134.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-98.134.1.aarch64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-98.134.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-98.134.1.ppc64le as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-98.134.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-98.134.1.s390x as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.s390x"
},
"product_reference": "docker-28.2.2_ce-98.134.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-98.134.1.x86_64 as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-98.134.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-98.134.1.noarch as component of SUSE Linux Enterprise Server 12 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 12 SP5-LTSS:docker-bash-completion-28.2.2_ce-98.134.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-98.134.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 12 SP5-LTSS"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-bash-completion-28.2.2_ce-98.134.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-bash-completion-28.2.2_ce-98.134.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.aarch64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.ppc64le",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.s390x",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-28.2.2_ce-98.134.1.x86_64",
"SUSE Linux Enterprise Server 12 SP5-LTSS:docker-bash-completion-28.2.2_ce-98.134.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-30T07:52:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02423-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for kubernetes1.23",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for kubernetes1.23 fixes the following issues:\n\n- CVE-2021-25743: Escape terminal special characters in kubectl output (bsc#1194400).\n- CVE-2023-2431: Prevent pods to bypass the seccomp profile enforcement (bsc#1212493).\n- CVE-2024-0793: Advance autoscaling v2 as the preferred API version (bsc#1219964).\n- CVE-2024-3177: Prevent bypassing mountable secrets policy imposed by the ServiceAccount admission plugin (bsc#1222539). \n- CVE-2025-22872: Properly handle trailing solidus in unquoted attribute value in foreign content (bsc#1241865).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2423,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2423,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2423,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2423,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2423,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2423,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2423,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2423,SUSE-Storage-7.1-2025-2423",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02423-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02423-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502423-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02423-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-August/041192.html"
},
{
"category": "self",
"summary": "SUSE Bug 1194400",
"url": "https://bugzilla.suse.com/1194400"
},
{
"category": "self",
"summary": "SUSE Bug 1212493",
"url": "https://bugzilla.suse.com/1212493"
},
{
"category": "self",
"summary": "SUSE Bug 1219964",
"url": "https://bugzilla.suse.com/1219964"
},
{
"category": "self",
"summary": "SUSE Bug 1222539",
"url": "https://bugzilla.suse.com/1222539"
},
{
"category": "self",
"summary": "SUSE Bug 1229008",
"url": "https://bugzilla.suse.com/1229008"
},
{
"category": "self",
"summary": "SUSE Bug 1241865",
"url": "https://bugzilla.suse.com/1241865"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2021-25743 page",
"url": "https://www.suse.com/security/cve/CVE-2021-25743/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-2431 page",
"url": "https://www.suse.com/security/cve/CVE-2023-2431/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-0793 page",
"url": "https://www.suse.com/security/cve/CVE-2024-0793/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-3177 page",
"url": "https://www.suse.com/security/cve/CVE-2024-3177/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for kubernetes1.23",
"tracking": {
"current_release_date": "2025-08-13T00:10:52Z",
"generator": {
"date": "2025-08-13T00:10:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02423-2",
"initial_release_date": "2025-08-13T00:10:52Z",
"revision_history": [
{
"date": "2025-08-13T00:10:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.aarch64",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.aarch64",
"product_id": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-client-bash-completion-1.23.17-150300.7.12.1.noarch",
"product": {
"name": "kubernetes1.23-client-bash-completion-1.23.17-150300.7.12.1.noarch",
"product_id": "kubernetes1.23-client-bash-completion-1.23.17-150300.7.12.1.noarch"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-fish-completion-1.23.17-150300.7.12.1.noarch",
"product": {
"name": "kubernetes1.23-client-fish-completion-1.23.17-150300.7.12.1.noarch",
"product_id": "kubernetes1.23-client-fish-completion-1.23.17-150300.7.12.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.ppc64le",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.ppc64le",
"product_id": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.s390x"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.s390x",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.s390x",
"product_id": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-apiserver-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-controller-manager-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-kubeadm-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-kubelet-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-kubelet-common-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-proxy-1.23.17-150300.7.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.x86_64",
"product": {
"name": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.x86_64",
"product_id": "kubernetes1.23-scheduler-1.23.17-150300.7.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
},
"product_reference": "kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2021-25743",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2021-25743"
}
],
"notes": [
{
"category": "general",
"text": "kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2021-25743",
"url": "https://www.suse.com/security/cve/CVE-2021-25743"
},
{
"category": "external",
"summary": "SUSE Bug 1194400 for CVE-2021-25743",
"url": "https://bugzilla.suse.com/1194400"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-13T00:10:52Z",
"details": "moderate"
}
],
"title": "CVE-2021-25743"
},
{
"cve": "CVE-2023-2431",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-2431"
}
],
"notes": [
{
"category": "general",
"text": "A security issue was discovered in Kubelet that allows pods to bypass the seccomp profile enforcement. Pods that use localhost type for seccomp profile but specify an empty profile field, are affected by this issue. In this scenario, this vulnerability allows the pod to run in unconfined (seccomp disabled) mode. This bug affects Kubelet.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-2431",
"url": "https://www.suse.com/security/cve/CVE-2023-2431"
},
{
"category": "external",
"summary": "SUSE Bug 1212493 for CVE-2023-2431",
"url": "https://bugzilla.suse.com/1212493"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 3.4,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-13T00:10:52Z",
"details": "low"
}
],
"title": "CVE-2023-2431"
},
{
"cve": "CVE-2024-0793",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-0793"
}
],
"notes": [
{
"category": "general",
"text": "A flaw was found in kube-controller-manager. This issue occurs when the initial application of a HPA config YAML lacking a .spec.behavior.scaleUp block causes a denial of service due to KCM pods going into restart churn.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-0793",
"url": "https://www.suse.com/security/cve/CVE-2024-0793"
},
{
"category": "external",
"summary": "SUSE Bug 1219964 for CVE-2024-0793",
"url": "https://bugzilla.suse.com/1219964"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-13T00:10:52Z",
"details": "moderate"
}
],
"title": "CVE-2024-0793"
},
{
"cve": "CVE-2024-3177",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-3177"
}
],
"notes": [
{
"category": "general",
"text": "A security issue was discovered in Kubernetes where users may be able to launch containers that bypass the mountable secrets policy enforced by the ServiceAccount admission plugin when using containers, init containers, and ephemeral containers with the envFrom field populated. The policy ensures pods running with a service account may only reference secrets specified in the service account\u0027s secrets field. Kubernetes clusters are only affected if the ServiceAccount admission plugin and the kubernetes.io/enforce-mountable-secrets annotation are used together with containers, init containers, and ephemeral containers with the envFrom field populated.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-3177",
"url": "https://www.suse.com/security/cve/CVE-2024-3177"
},
{
"category": "external",
"summary": "SUSE Bug 1222539 for CVE-2024-3177",
"url": "https://bugzilla.suse.com/1222539"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 2.7,
"baseSeverity": "LOW",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-13T00:10:52Z",
"details": "moderate"
}
],
"title": "CVE-2024-3177"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Enterprise Storage 7.1:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-1.23.17-150300.7.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:kubernetes1.23-client-common-1.23.17-150300.7.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-08-13T00:10:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
suse-su-2025:02289-2
Vulnerability from csaf_suse
Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for docker",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for docker fixes the following issues:\n\nUpdate to Docker 28.2.2-ce (bsc#1243833, bsc#1242114):\n\n- CVE-2025-0495: Fixed credential leakage to telemetry endpoints when credentials \n allowed to be set as attribute values in cache-to/cache-from configuration.(bsc#1239765)\n- CVE-2025-22872: golang.org/x/net/html: incorrectly interpreted tags can cause content to be placed wrong scope during DOM construction (bsc#1241830).\n\nOther fixes: \n \n- Update to docker-buildx v0.22.0.\n- Always clear SUSEConnect suse_* secrets when starting containers (bsc#1244035).\n- Disable transparent SUSEConnect support for SLE-16. (jsc#PED-12534)\n- Now that the only blocker for docker-buildx support was removed for SLE-16,\n enable docker-buildx for SLE-16 as well. (jsc#PED-8905)\n- SUSEConnect secrets fails in SLES rootless docker containers (bsc#1240150).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-2289,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-2289,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-2289,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-2289,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-2289,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-2289,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-2289,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-2289,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-2289,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-2289,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-2289,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-2289,SUSE-Storage-7.1-2025-2289",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_02289-2.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:02289-2",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202502289-2/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:02289-2",
"url": "https://lists.suse.com/pipermail/sle-updates/2025-July/040739.html"
},
{
"category": "self",
"summary": "SUSE Bug 1239765",
"url": "https://bugzilla.suse.com/1239765"
},
{
"category": "self",
"summary": "SUSE Bug 1240150",
"url": "https://bugzilla.suse.com/1240150"
},
{
"category": "self",
"summary": "SUSE Bug 1241830",
"url": "https://bugzilla.suse.com/1241830"
},
{
"category": "self",
"summary": "SUSE Bug 1242114",
"url": "https://bugzilla.suse.com/1242114"
},
{
"category": "self",
"summary": "SUSE Bug 1243833",
"url": "https://bugzilla.suse.com/1243833"
},
{
"category": "self",
"summary": "SUSE Bug 1244035",
"url": "https://bugzilla.suse.com/1244035"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-0495 page",
"url": "https://www.suse.com/security/cve/CVE-2025-0495/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-22872 page",
"url": "https://www.suse.com/security/cve/CVE-2025-22872/"
}
],
"title": "Security update for docker",
"tracking": {
"current_release_date": "2025-07-16T15:47:57Z",
"generator": {
"date": "2025-07-16T15:47:57Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:02289-2",
"initial_release_date": "2025-07-16T15:47:57Z",
"revision_history": [
{
"date": "2025-07-16T15:47:57Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.aarch64",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64",
"product_id": "docker-28.2.2_ce-150000.227.1.aarch64"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.i586",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.i586",
"product_id": "docker-28.2.2_ce-150000.227.1.i586"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.i586",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.i586",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-fish-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-rootless-extras-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"product": {
"name": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch",
"product_id": "docker-stable-zsh-completion-24.0.9_ce-150000.1.22.1.noarch"
}
},
{
"category": "product_version",
"name": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch",
"product": {
"name": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch",
"product_id": "docker-zsh-completion-28.2.2_ce-150000.227.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.ppc64le",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le",
"product_id": "docker-28.2.2_ce-150000.227.1.ppc64le"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.s390x",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.s390x",
"product_id": "docker-28.2.2_ce-150000.227.1.s390x"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "docker-28.2.2_ce-150000.227.1.x86_64",
"product": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64",
"product_id": "docker-28.2.2_ce-150000.227.1.x86_64"
}
},
{
"category": "product_version",
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"product": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"product_id": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-28.2.2_ce-150000.227.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64"
},
"product_reference": "docker-28.2.2_ce-150000.227.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch"
},
"product_reference": "docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64"
},
"product_reference": "docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
},
"product_reference": "docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-0495",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-0495"
}
],
"notes": [
{
"category": "general",
"text": "Buildx is a Docker CLI plugin that extends build capabilities using BuildKit.\n\nCache backends support credentials by setting secrets directly as attribute values in cache-to/cache-from configuration. When supplied as user input, these secure values may be inadvertently captured in OpenTelemetry traces as part of the arguments and flags for the traced CLI command. OpenTelemetry traces are also saved in BuildKit daemon\u0027s history records.\n\n\nThis vulnerability does not impact secrets passed to the Github cache backend via environment variables or registry authentication.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-0495",
"url": "https://www.suse.com/security/cve/CVE-2025-0495"
},
{
"category": "external",
"summary": "SUSE Bug 1239765 for CVE-2025-0495",
"url": "https://bugzilla.suse.com/1239765"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-16T15:47:57Z",
"details": "moderate"
}
],
"title": "CVE-2025-0495"
},
{
"cve": "CVE-2025-22872",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-22872"
}
],
"notes": [
{
"category": "general",
"text": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-22872",
"url": "https://www.suse.com/security/cve/CVE-2025-22872"
},
{
"category": "external",
"summary": "SUSE Bug 1241710 for CVE-2025-22872",
"url": "https://bugzilla.suse.com/1241710"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Enterprise Storage 7.1:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Enterprise Storage 7.1:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-fish-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-28.2.2_ce-150000.227.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-bash-completion-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-rootless-extras-28.2.2_ce-150000.227.1.noarch",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-24.0.9_ce-150000.1.22.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:docker-stable-bash-completion-24.0.9_ce-150000.1.22.1.noarch"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-07-16T15:47:57Z",
"details": "moderate"
}
],
"title": "CVE-2025-22872"
}
]
}
CERTFR-2025-AVI-0622
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry Windows | ||
| VMware | N/A | Stemcells sans le dernier correctif de sécurité | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry Windows | ||
| VMware | Tanzu | Anti-Virus sans le dernier correctif de sécurité pour Tanzu version 2.4.0 | ||
| VMware | Tanzu | Scheduler sans le dernier correctif de sécurité pour Tanzu version 2.0.19 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Platform | GenAI sans le dernier correctif de sécurité pour Tanzu Platform pour Cloud Foundry version 10.2.1 | ||
| VMware | Tanzu Application Service | Tanzu Application Service versions antérieures à 1.16.11 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Services sans le dernier correctif de sécurité pour Tanzu version 3.3.8 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.0.x antérieures à 10.0.8 pour Cloud Foundry | ||
| VMware | Tanzu Platform | Tanzu Platform versions 4.0.x antérieures à 4.0.38+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu | Spring Cloud Data Flow sans le dernier correctif de sécurité pour Tanzu version 1.14.7 | ||
| VMware | Tanzu Platform | Tanzu Platform versions 6.0.x antérieures à 6.0.18+LTS-T pour Cloud Foundry isolation segment | ||
| VMware | Tanzu Platform | Tanzu Platform versions 10.2.x antérieures à 10.2.1+LTS-T pour Cloud Foundry | ||
| VMware | Tanzu Application Service | Single Sign-On sans le dernier correctif de sécurité pour Tanzu Application Service version 1.16.11 | ||
| VMware | Tanzu | File Integrity Monitoring sans le dernier correctif de sécurité pour Tanzu version 2.1.47 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells sans le dernier correctif de s\u00e9curit\u00e9",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry Windows",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.4.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.0.19",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "GenAI sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Platform pour Cloud Foundry version 10.2.1",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 3.3.8",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.0.x ant\u00e9rieures \u00e0 10.0.8 pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 4.0.x ant\u00e9rieures \u00e0 4.0.38+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Data Flow sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 1.14.7",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 6.0.x ant\u00e9rieures \u00e0 6.0.18+LTS-T pour Cloud Foundry isolation segment",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform versions 10.2.x ant\u00e9rieures \u00e0 10.2.1+LTS-T pour Cloud Foundry",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu Application Service version 1.16.11",
"product": {
"name": "Tanzu Application Service",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring sans le dernier correctif de s\u00e9curit\u00e9 pour Tanzu version 2.1.47",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2020-8908",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8908"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-32149",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32149"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-24921",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24921"
},
{
"name": "CVE-2022-1434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1434"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1343",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1343"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2022-27191",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27191"
},
{
"name": "CVE-2022-2097",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2097"
},
{
"name": "CVE-2022-25647",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25647"
},
{
"name": "CVE-2022-28327",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28327"
},
{
"name": "CVE-2022-24675",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24675"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2022-42916",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42916"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2022-42915",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42915"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2022-41716",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41716"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-41722",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41722"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-41720",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41720"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-30634",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30634"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2022-27780",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27780"
},
{
"name": "CVE-2022-29804",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29804"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-2976",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2976"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-33201",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33201"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-36617",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36617"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2022-31030",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-31030"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2024-21068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21068"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2024-21012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21012"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45283",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45283"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45284",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45284"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2024-24786",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24786"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-21131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21131"
},
{
"name": "CVE-2024-21138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21138"
},
{
"name": "CVE-2024-21140",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21140"
},
{
"name": "CVE-2024-21144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21144"
},
{
"name": "CVE-2024-21145",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21145"
},
{
"name": "CVE-2024-21147",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21147"
},
{
"name": "CVE-2023-28756",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28756"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2022-24769",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-24769"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-21208",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21208"
},
{
"name": "CVE-2024-21210",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21210"
},
{
"name": "CVE-2024-21217",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21217"
},
{
"name": "CVE-2024-21235",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21235"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-0406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0406"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-21502",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21502"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2020-36843",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36843"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2025-30691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30691"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2020-15250",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15250"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2024-29018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29018"
},
{
"name": "CVE-2025-21613",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21613"
},
{
"name": "CVE-2025-21614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21614"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-4575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4575"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-27219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27219"
},
{
"name": "CVE-2025-27220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27220"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2022-21698",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21698"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-30761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30761"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2021-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3995"
},
{
"name": "CVE-2021-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3996"
},
{
"name": "CVE-2022-28948",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28948"
},
{
"name": "CVE-2022-29173",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29173"
},
{
"name": "CVE-2022-35929",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35929"
},
{
"name": "CVE-2022-36056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36056"
},
{
"name": "CVE-2022-36109",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36109"
},
{
"name": "CVE-2023-28755",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28755"
},
{
"name": "CVE-2023-30551",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30551"
},
{
"name": "CVE-2023-33199",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33199"
},
{
"name": "CVE-2023-33202",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33202"
},
{
"name": "CVE-2023-46737",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46737"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-24579",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24579"
},
{
"name": "CVE-2024-29902",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29902"
},
{
"name": "CVE-2024-29903",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29903"
},
{
"name": "CVE-2024-40635",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-40635"
},
{
"name": "CVE-2024-41909",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41909"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2024-52587",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52587"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-25186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25186"
},
{
"name": "CVE-2025-27221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27221"
},
{
"name": "CVE-2025-29786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29786"
},
{
"name": "CVE-2025-32441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32441"
},
{
"name": "CVE-2025-32955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32955"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-3445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3445"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-46727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46727"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-47290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47290"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-49014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49014"
},
{
"name": "CVE-2025-4949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4949"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
}
],
"initial_release_date": "2025-07-25T00:00:00",
"last_revision_date": "2025-07-25T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0622",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35981",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35981"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35967",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35967"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35980",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35980"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35974",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35974"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35979",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35979"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35984",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35984"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35970",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35970"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35983",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35983"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35978",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35978"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35968",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35968"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35973",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35973"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35976",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35976"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35969",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35969"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35966",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35966"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35972",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35972"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35977",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35977"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35982",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35982"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35971",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35971"
},
{
"published_at": "2025-07-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35975",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35975"
}
]
}
CERTFR-2025-AVI-0754
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Gemfire | Tanzu GemFire Management Console versions antérieures à 1.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions antérieures à 7.5.4 |
| Title | Publication Time | Tags | ||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu GemFire Management Console versions ant\u00e9rieures \u00e0 1.4.0",
"product": {
"name": "Tanzu Gemfire",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions ant\u00e9rieures \u00e0 7.5.4",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52434"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"initial_release_date": "2025-09-04T00:00:00",
"last_revision_date": "2025-09-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0754",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-04T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36085"
},
{
"published_at": "2025-09-03",
"title": "Bulletin de s\u00e9curit\u00e9 VMware TNZ-2025-0095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36086"
}
]
}
CERTFR-2025-AVI-0756
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T | ||
| VMware | Tanzu | Tanzu for MySQL on Cloud Foundry versions antérieures à 10.0.2 | ||
| VMware | Tanzu | Java Buildpack versions antérieures à 4.84.0 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy Azure Light versions antérieures à 1.894 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 10.0.9 | ||
| VMware | Tanzu | Tanzu Scheduler versions antérieures à 2.0.20 | ||
| VMware | Tanzu | Spring Cloud Services for VMware Tanzu versions antérieures à 3.3.9 | ||
| VMware | Tanzu | Tanzu GemFire versions antérieures à 10.1.4 | ||
| VMware | Tanzu Operations Manager | Tanzu Operations Manager versions antérieures à 3.1.2 | ||
| VMware | Tanzu Platform | Tanzu Platform for Cloud Foundry isolation segment versions antérieures à 6.0.19+LTS-T | ||
| VMware | Tanzu | Single Sign-On for VMware Tanzu Application Service versions antérieures à 1.16.12 | ||
| VMware | Tanzu | Tanzu Hub versions antérieures à 10.2.1 | ||
| VMware | Tanzu | Stemcells pour Ubuntu Jammy versions antérieures à 1.894 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Platform for Cloud Foundry isolation segment 10.2.2+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu for MySQL on Cloud Foundry versions ant\u00e9rieures \u00e0 10.0.2",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Java Buildpack versions ant\u00e9rieures \u00e0 4.84.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy Azure Light versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 10.0.9",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Scheduler versions ant\u00e9rieures \u00e0 2.0.20",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Spring Cloud Services for VMware Tanzu versions ant\u00e9rieures \u00e0 3.3.9",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu GemFire versions ant\u00e9rieures \u00e0 10.1.4",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Operations Manager versions ant\u00e9rieures \u00e0 3.1.2",
"product": {
"name": "Tanzu Operations Manager",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Platform for Cloud Foundry isolation segment versions ant\u00e9rieures \u00e0 6.0.19+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On for VMware Tanzu Application Service versions ant\u00e9rieures \u00e0 1.16.12",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.2.1",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells pour Ubuntu Jammy versions ant\u00e9rieures \u00e0 1.894",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2021-44832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44832"
},
{
"name": "CVE-2021-45105",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45105"
},
{
"name": "CVE-2021-44228",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44228"
},
{
"name": "CVE-2013-1548",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1548"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2017-8046",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8046"
},
{
"name": "CVE-2018-3280",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3280"
},
{
"name": "CVE-2018-3137",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3137"
},
{
"name": "CVE-2018-3285",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3285"
},
{
"name": "CVE-2018-3182",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3182"
},
{
"name": "CVE-2018-3186",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3186"
},
{
"name": "CVE-2018-3195",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3195"
},
{
"name": "CVE-2018-3286",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3286"
},
{
"name": "CVE-2018-3170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3170"
},
{
"name": "CVE-2018-3279",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3279"
},
{
"name": "CVE-2018-3212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3212"
},
{
"name": "CVE-2018-3203",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3203"
},
{
"name": "CVE-2018-3145",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3145"
},
{
"name": "CVE-2019-2530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2530"
},
{
"name": "CVE-2019-2436",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2436"
},
{
"name": "CVE-2019-2539",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2539"
},
{
"name": "CVE-2019-2494",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2494"
},
{
"name": "CVE-2019-2535",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2535"
},
{
"name": "CVE-2019-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2533"
},
{
"name": "CVE-2019-2495",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2495"
},
{
"name": "CVE-2019-2513",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2513"
},
{
"name": "CVE-2019-2536",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2536"
},
{
"name": "CVE-2019-2502",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2502"
},
{
"name": "CVE-2019-2634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2634"
},
{
"name": "CVE-2019-2587",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2587"
},
{
"name": "CVE-2019-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2584"
},
{
"name": "CVE-2019-2691",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2691"
},
{
"name": "CVE-2019-2606",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2606"
},
{
"name": "CVE-2019-2630",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2630"
},
{
"name": "CVE-2019-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2624"
},
{
"name": "CVE-2019-2623",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2623"
},
{
"name": "CVE-2019-2695",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2695"
},
{
"name": "CVE-2019-2596",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2596"
},
{
"name": "CVE-2019-2580",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2580"
},
{
"name": "CVE-2019-2644",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2644"
},
{
"name": "CVE-2019-2681",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2681"
},
{
"name": "CVE-2019-2617",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2617"
},
{
"name": "CVE-2019-2636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2636"
},
{
"name": "CVE-2019-2689",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2689"
},
{
"name": "CVE-2019-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2693"
},
{
"name": "CVE-2019-2593",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2593"
},
{
"name": "CVE-2019-2625",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2625"
},
{
"name": "CVE-2019-2585",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2585"
},
{
"name": "CVE-2019-2631",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2631"
},
{
"name": "CVE-2019-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2694"
},
{
"name": "CVE-2019-2620",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2620"
},
{
"name": "CVE-2019-2688",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2688"
},
{
"name": "CVE-2019-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2589"
},
{
"name": "CVE-2019-2635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2635"
},
{
"name": "CVE-2019-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2626"
},
{
"name": "CVE-2019-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2686"
},
{
"name": "CVE-2019-2685",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2685"
},
{
"name": "CVE-2019-2687",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2687"
},
{
"name": "CVE-2019-2607",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2607"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2019-2811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2811"
},
{
"name": "CVE-2019-2740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2740"
},
{
"name": "CVE-2019-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2879"
},
{
"name": "CVE-2019-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2808"
},
{
"name": "CVE-2019-2738",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2738"
},
{
"name": "CVE-2019-2819",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2819"
},
{
"name": "CVE-2019-2737",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2737"
},
{
"name": "CVE-2019-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2814"
},
{
"name": "CVE-2019-2778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2778"
},
{
"name": "CVE-2019-2822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2822"
},
{
"name": "CVE-2019-2802",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2802"
},
{
"name": "CVE-2019-2803",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2803"
},
{
"name": "CVE-2019-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2752"
},
{
"name": "CVE-2019-2826",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2826"
},
{
"name": "CVE-2019-2784",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2784"
},
{
"name": "CVE-2019-2789",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2789"
},
{
"name": "CVE-2019-2801",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2801"
},
{
"name": "CVE-2019-2791",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2791"
},
{
"name": "CVE-2019-2798",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2798"
},
{
"name": "CVE-2019-2796",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2796"
},
{
"name": "CVE-2019-2815",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2815"
},
{
"name": "CVE-2019-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2810"
},
{
"name": "CVE-2019-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2780"
},
{
"name": "CVE-2019-2758",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2758"
},
{
"name": "CVE-2019-2757",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2757"
},
{
"name": "CVE-2019-2785",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2785"
},
{
"name": "CVE-2019-2747",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2747"
},
{
"name": "CVE-2019-2741",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2741"
},
{
"name": "CVE-2019-2830",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2830"
},
{
"name": "CVE-2019-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2834"
},
{
"name": "CVE-2019-2743",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2743"
},
{
"name": "CVE-2019-2739",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2739"
},
{
"name": "CVE-2019-2805",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2805"
},
{
"name": "CVE-2019-2797",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2797"
},
{
"name": "CVE-2019-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2774"
},
{
"name": "CVE-2019-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2795"
},
{
"name": "CVE-2019-2746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2746"
},
{
"name": "CVE-2019-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2812"
},
{
"name": "CVE-2019-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2924"
},
{
"name": "CVE-2019-2914",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2914"
},
{
"name": "CVE-2019-2960",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2960"
},
{
"name": "CVE-2019-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2923"
},
{
"name": "CVE-2019-2968",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2968"
},
{
"name": "CVE-2019-2993",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2993"
},
{
"name": "CVE-2019-3009",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3009"
},
{
"name": "CVE-2019-2969",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2969"
},
{
"name": "CVE-2019-3011",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3011"
},
{
"name": "CVE-2019-2967",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2967"
},
{
"name": "CVE-2019-2946",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2946"
},
{
"name": "CVE-2019-2966",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2966"
},
{
"name": "CVE-2019-2957",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2957"
},
{
"name": "CVE-2019-2948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2948"
},
{
"name": "CVE-2019-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2922"
},
{
"name": "CVE-2019-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3004"
},
{
"name": "CVE-2019-2998",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2998"
},
{
"name": "CVE-2019-2911",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2911"
},
{
"name": "CVE-2019-2950",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2950"
},
{
"name": "CVE-2019-2910",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2910"
},
{
"name": "CVE-2019-3018",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3018"
},
{
"name": "CVE-2019-2974",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2974"
},
{
"name": "CVE-2019-2991",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2991"
},
{
"name": "CVE-2019-2997",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2997"
},
{
"name": "CVE-2019-2938",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2938"
},
{
"name": "CVE-2019-3003",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3003"
},
{
"name": "CVE-2019-2982",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2982"
},
{
"name": "CVE-2019-2963",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2963"
},
{
"name": "CVE-2020-2579",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2579"
},
{
"name": "CVE-2020-2584",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2584"
},
{
"name": "CVE-2020-2577",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2577"
},
{
"name": "CVE-2020-2679",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2679"
},
{
"name": "CVE-2020-2570",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2570"
},
{
"name": "CVE-2020-2572",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2572"
},
{
"name": "CVE-2020-2627",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2627"
},
{
"name": "CVE-2020-2660",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2660"
},
{
"name": "CVE-2020-2589",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2589"
},
{
"name": "CVE-2020-2573",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2573"
},
{
"name": "CVE-2020-2686",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2686"
},
{
"name": "CVE-2020-2694",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2694"
},
{
"name": "CVE-2020-2574",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2574"
},
{
"name": "CVE-2020-2770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2770"
},
{
"name": "CVE-2020-2925",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2925"
},
{
"name": "CVE-2020-2853",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2853"
},
{
"name": "CVE-2020-2774",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2774"
},
{
"name": "CVE-2020-2928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2928"
},
{
"name": "CVE-2020-2897",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2897"
},
{
"name": "CVE-2020-2812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2812"
},
{
"name": "CVE-2020-2765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2765"
},
{
"name": "CVE-2020-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2761"
},
{
"name": "CVE-2020-2790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2790"
},
{
"name": "CVE-2020-2752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2752"
},
{
"name": "CVE-2020-2904",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2904"
},
{
"name": "CVE-2020-2893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2893"
},
{
"name": "CVE-2020-2760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2760"
},
{
"name": "CVE-2020-2780",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2780"
},
{
"name": "CVE-2020-2903",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2903"
},
{
"name": "CVE-2020-2924",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2924"
},
{
"name": "CVE-2020-2806",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2806"
},
{
"name": "CVE-2020-2922",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2922"
},
{
"name": "CVE-2020-2901",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2901"
},
{
"name": "CVE-2020-2926",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2926"
},
{
"name": "CVE-2020-2923",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2923"
},
{
"name": "CVE-2020-2921",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2921"
},
{
"name": "CVE-2020-2779",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2779"
},
{
"name": "CVE-2020-2892",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2892"
},
{
"name": "CVE-2020-2896",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2896"
},
{
"name": "CVE-2020-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2804"
},
{
"name": "CVE-2020-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2895"
},
{
"name": "CVE-2020-2930",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2930"
},
{
"name": "CVE-2020-2814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2814"
},
{
"name": "CVE-2020-2759",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2759"
},
{
"name": "CVE-2020-2763",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2763"
},
{
"name": "CVE-2020-14550",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14550"
},
{
"name": "CVE-2020-14567",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14567"
},
{
"name": "CVE-2020-14559",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14559"
},
{
"name": "CVE-2020-14576",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14576"
},
{
"name": "CVE-2020-14540",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14540"
},
{
"name": "CVE-2020-14547",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14547"
},
{
"name": "CVE-2020-14553",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14553"
},
{
"name": "CVE-2020-14539",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14539"
},
{
"name": "CVE-2020-14845",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14845"
},
{
"name": "CVE-2020-14799",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14799"
},
{
"name": "CVE-2020-14793",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14793"
},
{
"name": "CVE-2020-14888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14888"
},
{
"name": "CVE-2020-14790",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14790"
},
{
"name": "CVE-2020-14789",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14789"
},
{
"name": "CVE-2020-14672",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14672"
},
{
"name": "CVE-2020-14846",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14846"
},
{
"name": "CVE-2020-14771",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14771"
},
{
"name": "CVE-2020-14873",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14873"
},
{
"name": "CVE-2020-14791",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14791"
},
{
"name": "CVE-2020-14769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14769"
},
{
"name": "CVE-2020-14844",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14844"
},
{
"name": "CVE-2020-14809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14809"
},
{
"name": "CVE-2020-14860",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14860"
},
{
"name": "CVE-2020-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14866"
},
{
"name": "CVE-2020-14861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14861"
},
{
"name": "CVE-2020-14773",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14773"
},
{
"name": "CVE-2020-14776",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14776"
},
{
"name": "CVE-2020-14852",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14852"
},
{
"name": "CVE-2020-14760",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14760"
},
{
"name": "CVE-2020-14870",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14870"
},
{
"name": "CVE-2020-14837",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14837"
},
{
"name": "CVE-2020-14893",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14893"
},
{
"name": "CVE-2020-14836",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14836"
},
{
"name": "CVE-2020-14829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14829"
},
{
"name": "CVE-2020-14868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14868"
},
{
"name": "CVE-2020-14827",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14827"
},
{
"name": "CVE-2020-14839",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14839"
},
{
"name": "CVE-2020-14777",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14777"
},
{
"name": "CVE-2020-14812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14812"
},
{
"name": "CVE-2020-14775",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14775"
},
{
"name": "CVE-2020-14838",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14838"
},
{
"name": "CVE-2020-14869",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14869"
},
{
"name": "CVE-2020-14765",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14765"
},
{
"name": "CVE-2020-14814",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14814"
},
{
"name": "CVE-2020-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14821"
},
{
"name": "CVE-2020-14830",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14830"
},
{
"name": "CVE-2020-14828",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14828"
},
{
"name": "CVE-2020-14804",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14804"
},
{
"name": "CVE-2020-14800",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14800"
},
{
"name": "CVE-2020-14891",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14891"
},
{
"name": "CVE-2020-14848",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14848"
},
{
"name": "CVE-2020-14867",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14867"
},
{
"name": "CVE-2020-14785",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14785"
},
{
"name": "CVE-2020-14794",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14794"
},
{
"name": "CVE-2020-14786",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14786"
},
{
"name": "CVE-2020-15358",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15358"
},
{
"name": "CVE-2020-1971",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1971"
},
{
"name": "CVE-2021-2010",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2010"
},
{
"name": "CVE-2021-2001",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2001"
},
{
"name": "CVE-2021-2060",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2060"
},
{
"name": "CVE-2021-2014",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2014"
},
{
"name": "CVE-2021-2032",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2032"
},
{
"name": "CVE-2021-2036",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2036"
},
{
"name": "CVE-2021-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2007"
},
{
"name": "CVE-2021-2011",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2011"
},
{
"name": "CVE-2021-2022",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2022"
},
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2021-2308",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2308"
},
{
"name": "CVE-2021-2213",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2213"
},
{
"name": "CVE-2021-2172",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2172"
},
{
"name": "CVE-2021-2293",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2293"
},
{
"name": "CVE-2021-2208",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2208"
},
{
"name": "CVE-2021-2196",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2196"
},
{
"name": "CVE-2021-2194",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2194"
},
{
"name": "CVE-2021-2298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2298"
},
{
"name": "CVE-2021-2162",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2162"
},
{
"name": "CVE-2021-2179",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2179"
},
{
"name": "CVE-2021-2307",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2307"
},
{
"name": "CVE-2021-2217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2217"
},
{
"name": "CVE-2021-2180",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2180"
},
{
"name": "CVE-2021-2203",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2203"
},
{
"name": "CVE-2021-2144",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2144"
},
{
"name": "CVE-2021-2226",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2226"
},
{
"name": "CVE-2021-2232",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2232"
},
{
"name": "CVE-2021-2169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2169"
},
{
"name": "CVE-2021-2301",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2301"
},
{
"name": "CVE-2021-2202",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2202"
},
{
"name": "CVE-2021-2166",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2166"
},
{
"name": "CVE-2021-2174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2174"
},
{
"name": "CVE-2021-2154",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2154"
},
{
"name": "CVE-2021-2193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2193"
},
{
"name": "CVE-2021-2300",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2300"
},
{
"name": "CVE-2021-2299",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2299"
},
{
"name": "CVE-2021-2212",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2212"
},
{
"name": "CVE-2021-2178",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2178"
},
{
"name": "CVE-2021-2146",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2146"
},
{
"name": "CVE-2021-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2230"
},
{
"name": "CVE-2021-2278",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2278"
},
{
"name": "CVE-2021-2164",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2164"
},
{
"name": "CVE-2021-2201",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2201"
},
{
"name": "CVE-2021-2170",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2170"
},
{
"name": "CVE-2021-2304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2304"
},
{
"name": "CVE-2021-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2160"
},
{
"name": "CVE-2021-2171",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2171"
},
{
"name": "CVE-2021-2305",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2305"
},
{
"name": "CVE-2021-2215",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2215"
},
{
"name": "CVE-2021-25214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25214"
},
{
"name": "CVE-2012-6153",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6153"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2021-2370",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2370"
},
{
"name": "CVE-2021-2389",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2389"
},
{
"name": "CVE-2021-2444",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2444"
},
{
"name": "CVE-2021-2429",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2429"
},
{
"name": "CVE-2021-2426",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2426"
},
{
"name": "CVE-2021-2427",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2427"
},
{
"name": "CVE-2021-2339",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2339"
},
{
"name": "CVE-2021-2425",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2425"
},
{
"name": "CVE-2021-2387",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2387"
},
{
"name": "CVE-2021-2383",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2383"
},
{
"name": "CVE-2021-2372",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2372"
},
{
"name": "CVE-2021-2399",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2399"
},
{
"name": "CVE-2021-2384",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2384"
},
{
"name": "CVE-2021-2412",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2412"
},
{
"name": "CVE-2021-2441",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2441"
},
{
"name": "CVE-2021-2410",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2410"
},
{
"name": "CVE-2021-2342",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2342"
},
{
"name": "CVE-2021-2437",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2437"
},
{
"name": "CVE-2021-2417",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2417"
},
{
"name": "CVE-2021-2424",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2424"
},
{
"name": "CVE-2021-2385",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2385"
},
{
"name": "CVE-2021-2357",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2357"
},
{
"name": "CVE-2021-2352",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2352"
},
{
"name": "CVE-2021-2402",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2402"
},
{
"name": "CVE-2021-2440",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2440"
},
{
"name": "CVE-2021-2340",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2340"
},
{
"name": "CVE-2021-2390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2390"
},
{
"name": "CVE-2021-2374",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2374"
},
{
"name": "CVE-2021-2356",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2356"
},
{
"name": "CVE-2021-2411",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2411"
},
{
"name": "CVE-2021-2418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2418"
},
{
"name": "CVE-2021-2367",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2367"
},
{
"name": "CVE-2021-2354",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2354"
},
{
"name": "CVE-2021-2422",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2422"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2021-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23337"
},
{
"name": "CVE-2020-28500",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28500"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2021-35640",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35640"
},
{
"name": "CVE-2021-35626",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35626"
},
{
"name": "CVE-2021-2478",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2478"
},
{
"name": "CVE-2021-35624",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35624"
},
{
"name": "CVE-2021-35583",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35583"
},
{
"name": "CVE-2021-35628",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35628"
},
{
"name": "CVE-2021-35630",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35630"
},
{
"name": "CVE-2021-35644",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35644"
},
{
"name": "CVE-2021-2479",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2479"
},
{
"name": "CVE-2021-35638",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35638"
},
{
"name": "CVE-2021-35646",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35646"
},
{
"name": "CVE-2021-35596",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35596"
},
{
"name": "CVE-2021-35643",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35643"
},
{
"name": "CVE-2021-35637",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35637"
},
{
"name": "CVE-2021-35623",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35623"
},
{
"name": "CVE-2021-35632",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35632"
},
{
"name": "CVE-2021-35641",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35641"
},
{
"name": "CVE-2021-35604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35604"
},
{
"name": "CVE-2021-35636",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35636"
},
{
"name": "CVE-2021-35546",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35546"
},
{
"name": "CVE-2021-35627",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35627"
},
{
"name": "CVE-2021-35625",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35625"
},
{
"name": "CVE-2021-35608",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35608"
},
{
"name": "CVE-2021-35597",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35597"
},
{
"name": "CVE-2021-35537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35537"
},
{
"name": "CVE-2021-2481",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-2481"
},
{
"name": "CVE-2021-35622",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35622"
},
{
"name": "CVE-2021-35610",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35610"
},
{
"name": "CVE-2021-35633",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35633"
},
{
"name": "CVE-2021-35634",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35634"
},
{
"name": "CVE-2021-35629",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35629"
},
{
"name": "CVE-2021-35631",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35631"
},
{
"name": "CVE-2021-35645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35645"
},
{
"name": "CVE-2021-35647",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35647"
},
{
"name": "CVE-2021-35612",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35612"
},
{
"name": "CVE-2021-35639",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35639"
},
{
"name": "CVE-2021-35648",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35648"
},
{
"name": "CVE-2021-35607",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35607"
},
{
"name": "CVE-2021-35602",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35602"
},
{
"name": "CVE-2021-35577",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35577"
},
{
"name": "CVE-2021-35642",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35642"
},
{
"name": "CVE-2021-35575",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35575"
},
{
"name": "CVE-2021-35635",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35635"
},
{
"name": "CVE-2021-35591",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35591"
},
{
"name": "CVE-2021-25219",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25219"
},
{
"name": "CVE-2021-3875",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3875"
},
{
"name": "CVE-2019-10744",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10744"
},
{
"name": "CVE-2022-21352",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21352"
},
{
"name": "CVE-2022-21304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21304"
},
{
"name": "CVE-2022-21254",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21254"
},
{
"name": "CVE-2022-21265",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21265"
},
{
"name": "CVE-2022-21348",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21348"
},
{
"name": "CVE-2022-21372",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21372"
},
{
"name": "CVE-2022-21245",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21245"
},
{
"name": "CVE-2022-21368",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21368"
},
{
"name": "CVE-2022-21339",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21339"
},
{
"name": "CVE-2022-21264",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21264"
},
{
"name": "CVE-2022-21297",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21297"
},
{
"name": "CVE-2022-21379",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21379"
},
{
"name": "CVE-2022-21253",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21253"
},
{
"name": "CVE-2022-21301",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21301"
},
{
"name": "CVE-2022-21378",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21378"
},
{
"name": "CVE-2022-21370",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21370"
},
{
"name": "CVE-2022-21302",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21302"
},
{
"name": "CVE-2022-21249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21249"
},
{
"name": "CVE-2022-21344",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21344"
},
{
"name": "CVE-2022-21270",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21270"
},
{
"name": "CVE-2022-21367",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21367"
},
{
"name": "CVE-2022-21342",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21342"
},
{
"name": "CVE-2022-21362",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21362"
},
{
"name": "CVE-2022-21303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21303"
},
{
"name": "CVE-2022-21256",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21256"
},
{
"name": "CVE-2022-21358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21358"
},
{
"name": "CVE-2022-21374",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21374"
},
{
"name": "CVE-2022-3602",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3602"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2022-35737",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35737"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2020-8203",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8203"
},
{
"name": "CVE-2022-3786",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3786"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2022-22942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22942"
},
{
"name": "CVE-2021-4193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4193"
},
{
"name": "CVE-2020-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15366"
},
{
"name": "CVE-2022-22965",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22965"
},
{
"name": "CVE-2022-0213",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0213"
},
{
"name": "CVE-2022-21418",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21418"
},
{
"name": "CVE-2022-21412",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21412"
},
{
"name": "CVE-2022-21437",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21437"
},
{
"name": "CVE-2022-21478",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21478"
},
{
"name": "CVE-2022-21479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21479"
},
{
"name": "CVE-2022-21438",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21438"
},
{
"name": "CVE-2022-21440",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21440"
},
{
"name": "CVE-2022-21451",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21451"
},
{
"name": "CVE-2022-21427",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21427"
},
{
"name": "CVE-2022-21415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21415"
},
{
"name": "CVE-2022-21459",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21459"
},
{
"name": "CVE-2022-21460",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21460"
},
{
"name": "CVE-2022-21414",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21414"
},
{
"name": "CVE-2022-21413",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21413"
},
{
"name": "CVE-2022-21436",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21436"
},
{
"name": "CVE-2022-21435",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21435"
},
{
"name": "CVE-2022-21462",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21462"
},
{
"name": "CVE-2022-21444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21444"
},
{
"name": "CVE-2022-21417",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21417"
},
{
"name": "CVE-2022-21457",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21457"
},
{
"name": "CVE-2022-21425",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21425"
},
{
"name": "CVE-2022-21452",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21452"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2022-1292",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1292"
},
{
"name": "CVE-2022-1473",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1473"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2021-4122",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4122"
},
{
"name": "CVE-2022-2068",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2068"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2022-21525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21525"
},
{
"name": "CVE-2022-21537",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21537"
},
{
"name": "CVE-2022-21455",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21455"
},
{
"name": "CVE-2022-21534",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21534"
},
{
"name": "CVE-2022-21528",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21528"
},
{
"name": "CVE-2022-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21529"
},
{
"name": "CVE-2022-21531",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21531"
},
{
"name": "CVE-2022-21515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21515"
},
{
"name": "CVE-2022-21538",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21538"
},
{
"name": "CVE-2022-21527",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21527"
},
{
"name": "CVE-2022-21517",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21517"
},
{
"name": "CVE-2022-21539",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21539"
},
{
"name": "CVE-2022-21556",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21556"
},
{
"name": "CVE-2022-21509",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21509"
},
{
"name": "CVE-2022-21553",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21553"
},
{
"name": "CVE-2022-21530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21530"
},
{
"name": "CVE-2022-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21522"
},
{
"name": "CVE-2022-21547",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21547"
},
{
"name": "CVE-2022-21569",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21569"
},
{
"name": "CVE-2022-21526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21526"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2021-25220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25220"
},
{
"name": "CVE-2022-0396",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0396"
},
{
"name": "CVE-2022-3358",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3358"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2012-5783",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5783"
},
{
"name": "CVE-2022-21592",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21592"
},
{
"name": "CVE-2022-21617",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21617"
},
{
"name": "CVE-2022-21595",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21595"
},
{
"name": "CVE-2022-21608",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21608"
},
{
"name": "CVE-2022-21589",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21589"
},
{
"name": "CVE-2023-21863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21863"
},
{
"name": "CVE-2023-21873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21873"
},
{
"name": "CVE-2023-21879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21879"
},
{
"name": "CVE-2023-21880",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21880"
},
{
"name": "CVE-2023-21869",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21869"
},
{
"name": "CVE-2023-21872",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21872"
},
{
"name": "CVE-2023-21877",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21877"
},
{
"name": "CVE-2023-21870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21870"
},
{
"name": "CVE-2023-21887",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21887"
},
{
"name": "CVE-2023-21836",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21836"
},
{
"name": "CVE-2023-21881",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21881"
},
{
"name": "CVE-2023-21876",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21876"
},
{
"name": "CVE-2023-21840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21840"
},
{
"name": "CVE-2023-21878",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21878"
},
{
"name": "CVE-2023-21866",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21866"
},
{
"name": "CVE-2023-21875",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21875"
},
{
"name": "CVE-2023-21865",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21865"
},
{
"name": "CVE-2023-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21883"
},
{
"name": "CVE-2023-21867",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21867"
},
{
"name": "CVE-2023-21874",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21874"
},
{
"name": "CVE-2023-21871",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21871"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2022-4415",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4415"
},
{
"name": "CVE-2023-24329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24329"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2023-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21963"
},
{
"name": "CVE-2023-21977",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21977"
},
{
"name": "CVE-2023-21912",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-21912"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2023-20873",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20873"
},
{
"name": "CVE-2023-20883",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-20883"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2023-27537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27537"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2022-46908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-46908"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2023-22053",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22053"
},
{
"name": "CVE-2023-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22007"
},
{
"name": "CVE-2022-4899",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4899"
},
{
"name": "CVE-2022-25883",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25883"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2023-35116",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-35116"
},
{
"name": "CVE-2023-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22097"
},
{
"name": "CVE-2023-22084",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22084"
},
{
"name": "CVE-2023-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22026"
},
{
"name": "CVE-2023-22028",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22028"
},
{
"name": "CVE-2023-22015",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22015"
},
{
"name": "CVE-2023-22103",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22103"
},
{
"name": "CVE-2023-22068",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22068"
},
{
"name": "CVE-2023-22078",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22078"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2023-22059",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22059"
},
{
"name": "CVE-2023-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22066"
},
{
"name": "CVE-2023-22114",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22114"
},
{
"name": "CVE-2023-22070",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22070"
},
{
"name": "CVE-2023-22032",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-22032"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2021-22570",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22570"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2023-34055",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34055"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2022-3715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3715"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2021-33294",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33294"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2023-34969",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34969"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2023-7104",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7104"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2023-46219",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46219"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2023-47100",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47100"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2023-39325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39325"
},
{
"name": "CVE-2022-27772",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27772"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-6481",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6481"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2024-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2511"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2024-0553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0553"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2023-6597",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6597"
},
{
"name": "CVE-2024-26686",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26686"
},
{
"name": "CVE-2023-52572",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52572"
},
{
"name": "CVE-2007-4559",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4559"
},
{
"name": "CVE-2023-3138",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3138"
},
{
"name": "CVE-2024-28182",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28182"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-6378",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6378"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2024-26739",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26739"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2023-52757",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52757"
},
{
"name": "CVE-2024-35866",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35866"
},
{
"name": "CVE-2024-35867",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35867"
},
{
"name": "CVE-2024-35943",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35943"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2024-35790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35790"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2004"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2024-0397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0397"
},
{
"name": "CVE-2024-4030",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4030"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-0450",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0450"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2024-36945",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36945"
},
{
"name": "CVE-2024-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38540"
},
{
"name": "CVE-2024-38541",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38541"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-0567",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0567"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-21137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21137"
},
{
"name": "CVE-2024-0760",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0760"
},
{
"name": "CVE-2024-1737",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1737"
},
{
"name": "CVE-2024-1975",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1975"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2024-6923",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6923"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2024-36908",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36908"
},
{
"name": "CVE-2024-27402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27402"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2024-38808",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38808"
},
{
"name": "CVE-2024-38809",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38809"
},
{
"name": "CVE-2024-42230",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42230"
},
{
"name": "CVE-2024-38807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38807"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2022-48893",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48893"
},
{
"name": "CVE-2024-42322",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-42322"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2023-5841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5841"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2023-6246",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6246"
},
{
"name": "CVE-2024-46812",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46812"
},
{
"name": "CVE-2024-46821",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46821"
},
{
"name": "CVE-2024-46751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46751"
},
{
"name": "CVE-2024-46753",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46753"
},
{
"name": "CVE-2024-46774",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46774"
},
{
"name": "CVE-2024-46787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46787"
},
{
"name": "CVE-2022-21454",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21454"
},
{
"name": "CVE-2024-21193",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21193"
},
{
"name": "CVE-2024-21194",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21194"
},
{
"name": "CVE-2024-21196",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21196"
},
{
"name": "CVE-2024-21197",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21197"
},
{
"name": "CVE-2024-21198",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21198"
},
{
"name": "CVE-2024-21199",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21199"
},
{
"name": "CVE-2024-21201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21201"
},
{
"name": "CVE-2024-21207",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21207"
},
{
"name": "CVE-2024-21209",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21209"
},
{
"name": "CVE-2024-21212",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21212"
},
{
"name": "CVE-2024-21213",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21213"
},
{
"name": "CVE-2024-21219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21219"
},
{
"name": "CVE-2024-21236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21236"
},
{
"name": "CVE-2024-21239",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21239"
},
{
"name": "CVE-2024-21241",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21241"
},
{
"name": "CVE-2024-7254",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7254"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2024-10487",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10487"
},
{
"name": "CVE-2024-10458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10458"
},
{
"name": "CVE-2024-10459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10459"
},
{
"name": "CVE-2024-10460",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10460"
},
{
"name": "CVE-2024-10461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10461"
},
{
"name": "CVE-2024-10462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10462"
},
{
"name": "CVE-2024-10463",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10463"
},
{
"name": "CVE-2024-10464",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10464"
},
{
"name": "CVE-2024-10465",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10465"
},
{
"name": "CVE-2024-10466",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10466"
},
{
"name": "CVE-2024-10467",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10467"
},
{
"name": "CVE-2024-10468",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10468"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38286"
},
{
"name": "CVE-2024-7592",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7592"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2024-46816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46816"
},
{
"name": "CVE-2024-11395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11395"
},
{
"name": "CVE-2024-49960",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49960"
},
{
"name": "CVE-2024-50047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50047"
},
{
"name": "CVE-2024-50073",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50073"
},
{
"name": "CVE-2024-11691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11691"
},
{
"name": "CVE-2024-11692",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11692"
},
{
"name": "CVE-2024-11693",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11693"
},
{
"name": "CVE-2024-11694",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11694"
},
{
"name": "CVE-2024-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11695"
},
{
"name": "CVE-2024-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11696"
},
{
"name": "CVE-2024-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11697"
},
{
"name": "CVE-2024-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11698"
},
{
"name": "CVE-2024-11699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11699"
},
{
"name": "CVE-2024-11700",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11700"
},
{
"name": "CVE-2024-11701",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11701"
},
{
"name": "CVE-2024-11702",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11702"
},
{
"name": "CVE-2024-11703",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11703"
},
{
"name": "CVE-2024-11704",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11704"
},
{
"name": "CVE-2024-11705",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11705"
},
{
"name": "CVE-2024-11706",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11706"
},
{
"name": "CVE-2024-11708",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11708"
},
{
"name": "CVE-2024-50272",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50272"
},
{
"name": "CVE-2024-50280",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50280"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2024-47554",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47554"
},
{
"name": "CVE-2024-49989",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49989"
},
{
"name": "CVE-2024-50125",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50125"
},
{
"name": "CVE-2024-53051",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53051"
},
{
"name": "CVE-2024-53144",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53144"
},
{
"name": "CVE-2024-8805",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8805"
},
{
"name": "CVE-2025-0237",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0237"
},
{
"name": "CVE-2025-0238",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0238"
},
{
"name": "CVE-2025-0239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0239"
},
{
"name": "CVE-2025-0240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0240"
},
{
"name": "CVE-2025-0241",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0241"
},
{
"name": "CVE-2025-0242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0242"
},
{
"name": "CVE-2025-0243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0243"
},
{
"name": "CVE-2025-0245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0245"
},
{
"name": "CVE-2025-0247",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0247"
},
{
"name": "CVE-2025-0434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0434"
},
{
"name": "CVE-2025-0435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0435"
},
{
"name": "CVE-2025-0436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0436"
},
{
"name": "CVE-2025-0437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0437"
},
{
"name": "CVE-2025-0438",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0438"
},
{
"name": "CVE-2025-0439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0439"
},
{
"name": "CVE-2025-0440",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0440"
},
{
"name": "CVE-2025-0441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0441"
},
{
"name": "CVE-2025-0442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0442"
},
{
"name": "CVE-2025-0443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0443"
},
{
"name": "CVE-2025-0446",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0446"
},
{
"name": "CVE-2025-0447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0447"
},
{
"name": "CVE-2025-0448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0448"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-0612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0612"
},
{
"name": "CVE-2025-23083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23083"
},
{
"name": "CVE-2025-23084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23084"
},
{
"name": "CVE-2025-23085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23085"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0444"
},
{
"name": "CVE-2025-0445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0445"
},
{
"name": "CVE-2025-0451",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0451"
},
{
"name": "CVE-2025-0762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0762"
},
{
"name": "CVE-2025-1009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1009"
},
{
"name": "CVE-2025-1010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1010"
},
{
"name": "CVE-2025-1011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1011"
},
{
"name": "CVE-2025-1012",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1012"
},
{
"name": "CVE-2025-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1013"
},
{
"name": "CVE-2025-1014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1014"
},
{
"name": "CVE-2024-56664",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56664"
},
{
"name": "CVE-2025-1016",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1016"
},
{
"name": "CVE-2025-1017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1017"
},
{
"name": "CVE-2025-1018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1018"
},
{
"name": "CVE-2025-1019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1019"
},
{
"name": "CVE-2025-1020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1020"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2024-50258",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50258"
},
{
"name": "CVE-2024-53203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53203"
},
{
"name": "CVE-2024-53128",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53128"
},
{
"name": "CVE-2025-0995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0995"
},
{
"name": "CVE-2025-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0996"
},
{
"name": "CVE-2025-0997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0997"
},
{
"name": "CVE-2025-0998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0998"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1414"
},
{
"name": "CVE-2025-0999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0999"
},
{
"name": "CVE-2025-1006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1006"
},
{
"name": "CVE-2025-1426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1426"
},
{
"name": "CVE-2024-56751",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56751"
},
{
"name": "CVE-2023-39017",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39017"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-1914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1914"
},
{
"name": "CVE-2025-1915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1915"
},
{
"name": "CVE-2025-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1916"
},
{
"name": "CVE-2025-1917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1917"
},
{
"name": "CVE-2025-1918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1918"
},
{
"name": "CVE-2025-1919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1919"
},
{
"name": "CVE-2025-1921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1921"
},
{
"name": "CVE-2025-1922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1922"
},
{
"name": "CVE-2025-1923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1923"
},
{
"name": "CVE-2025-1930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1930"
},
{
"name": "CVE-2025-1931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1931"
},
{
"name": "CVE-2025-1932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1932"
},
{
"name": "CVE-2025-1933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1933"
},
{
"name": "CVE-2025-1934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1934"
},
{
"name": "CVE-2025-1935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1935"
},
{
"name": "CVE-2025-1936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1936"
},
{
"name": "CVE-2025-1937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1937"
},
{
"name": "CVE-2025-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1938"
},
{
"name": "CVE-2025-1939",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1939"
},
{
"name": "CVE-2025-1940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1940"
},
{
"name": "CVE-2025-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1941"
},
{
"name": "CVE-2025-1942",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1942"
},
{
"name": "CVE-2025-1943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1943"
},
{
"name": "CVE-2025-1920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1920"
},
{
"name": "CVE-2025-2135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2135"
},
{
"name": "CVE-2025-2136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2136"
},
{
"name": "CVE-2025-2137",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2137"
},
{
"name": "CVE-2025-24813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24813"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-45338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45338"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-45772",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45772"
},
{
"name": "CVE-2025-2476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2476"
},
{
"name": "CVE-2025-2857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2857"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-2783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2783"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2022-49535",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49535"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-3066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3066"
},
{
"name": "CVE-2025-3067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3067"
},
{
"name": "CVE-2025-3068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3068"
},
{
"name": "CVE-2025-3071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3071"
},
{
"name": "CVE-2025-3072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3072"
},
{
"name": "CVE-2025-3073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3073"
},
{
"name": "CVE-2025-3074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3074"
},
{
"name": "CVE-2025-3028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3028"
},
{
"name": "CVE-2025-3029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3029"
},
{
"name": "CVE-2025-3030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3030"
},
{
"name": "CVE-2025-3031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3031"
},
{
"name": "CVE-2025-3032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3032"
},
{
"name": "CVE-2025-3033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3033"
},
{
"name": "CVE-2025-3034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3034"
},
{
"name": "CVE-2025-3035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3035"
},
{
"name": "CVE-2024-54458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-54458"
},
{
"name": "CVE-2025-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3608"
},
{
"name": "CVE-2025-21574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21574"
},
{
"name": "CVE-2025-21575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21575"
},
{
"name": "CVE-2025-21577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21577"
},
{
"name": "CVE-2025-21579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21579"
},
{
"name": "CVE-2025-21580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21580"
},
{
"name": "CVE-2025-21581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21581"
},
{
"name": "CVE-2025-21584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21584"
},
{
"name": "CVE-2025-21585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21585"
},
{
"name": "CVE-2025-21588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21588"
},
{
"name": "CVE-2025-30681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30681"
},
{
"name": "CVE-2025-30682",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30682"
},
{
"name": "CVE-2025-30683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30683"
},
{
"name": "CVE-2025-30684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30684"
},
{
"name": "CVE-2025-30685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30685"
},
{
"name": "CVE-2025-30687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30687"
},
{
"name": "CVE-2025-30688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30688"
},
{
"name": "CVE-2025-30689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30689"
},
{
"name": "CVE-2025-30693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30693"
},
{
"name": "CVE-2025-30695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30695"
},
{
"name": "CVE-2025-30696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30696"
},
{
"name": "CVE-2025-30699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30699"
},
{
"name": "CVE-2025-30703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30703"
},
{
"name": "CVE-2025-30704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30704"
},
{
"name": "CVE-2025-30705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30705"
},
{
"name": "CVE-2025-30715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30715"
},
{
"name": "CVE-2025-30721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30721"
},
{
"name": "CVE-2025-21839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21839"
},
{
"name": "CVE-2025-3619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3619"
},
{
"name": "CVE-2025-3620",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3620"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21941"
},
{
"name": "CVE-2025-21956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21956"
},
{
"name": "CVE-2025-21957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21957"
},
{
"name": "CVE-2025-21959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21959"
},
{
"name": "CVE-2025-21962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21962"
},
{
"name": "CVE-2025-21963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21963"
},
{
"name": "CVE-2025-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21964"
},
{
"name": "CVE-2025-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21968"
},
{
"name": "CVE-2025-21970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21970"
},
{
"name": "CVE-2025-21975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21975"
},
{
"name": "CVE-2025-21981",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21981"
},
{
"name": "CVE-2025-21991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21991"
},
{
"name": "CVE-2025-21992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21992"
},
{
"name": "CVE-2025-21994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21994"
},
{
"name": "CVE-2025-21996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21996"
},
{
"name": "CVE-2025-21999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21999"
},
{
"name": "CVE-2025-22004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22004"
},
{
"name": "CVE-2025-22005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22005"
},
{
"name": "CVE-2025-22007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22007"
},
{
"name": "CVE-2025-22008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22008"
},
{
"name": "CVE-2025-22010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22010"
},
{
"name": "CVE-2025-22014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22014"
},
{
"name": "CVE-2024-12798",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12798"
},
{
"name": "CVE-2024-12801",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12801"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-2312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2312"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-4050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4050"
},
{
"name": "CVE-2025-4051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4051"
},
{
"name": "CVE-2025-4052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4052"
},
{
"name": "CVE-2025-4096",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4096"
},
{
"name": "CVE-2025-2817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2817"
},
{
"name": "CVE-2025-4082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4082"
},
{
"name": "CVE-2025-4083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4083"
},
{
"name": "CVE-2025-4085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4085"
},
{
"name": "CVE-2025-4087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4087"
},
{
"name": "CVE-2025-4088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4088"
},
{
"name": "CVE-2025-4089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4089"
},
{
"name": "CVE-2025-4090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4090"
},
{
"name": "CVE-2025-4091",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4091"
},
{
"name": "CVE-2025-4092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4092"
},
{
"name": "CVE-2023-53034",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53034"
},
{
"name": "CVE-2024-46742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46742"
},
{
"name": "CVE-2025-21853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21853"
},
{
"name": "CVE-2025-22025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22025"
},
{
"name": "CVE-2025-22027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22027"
},
{
"name": "CVE-2025-22035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22035"
},
{
"name": "CVE-2025-22044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22044"
},
{
"name": "CVE-2025-22045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22045"
},
{
"name": "CVE-2025-22050",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22050"
},
{
"name": "CVE-2025-22054",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22054"
},
{
"name": "CVE-2025-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22055"
},
{
"name": "CVE-2025-22056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22056"
},
{
"name": "CVE-2025-22060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22060"
},
{
"name": "CVE-2025-22063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22063"
},
{
"name": "CVE-2025-22066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22066"
},
{
"name": "CVE-2025-22071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22071"
},
{
"name": "CVE-2025-22073",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22073"
},
{
"name": "CVE-2025-22075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22075"
},
{
"name": "CVE-2025-22079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22079"
},
{
"name": "CVE-2025-22081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22081"
},
{
"name": "CVE-2025-22086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22086"
},
{
"name": "CVE-2025-22089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22089"
},
{
"name": "CVE-2025-22097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22097"
},
{
"name": "CVE-2025-23136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23136"
},
{
"name": "CVE-2025-23138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23138"
},
{
"name": "CVE-2025-37785",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37785"
},
{
"name": "CVE-2025-37838",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37838"
},
{
"name": "CVE-2025-38152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38152"
},
{
"name": "CVE-2025-38575",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38575"
},
{
"name": "CVE-2025-38637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38637"
},
{
"name": "CVE-2025-39728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39728"
},
{
"name": "CVE-2025-39735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39735"
},
{
"name": "CVE-2025-27516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27516"
},
{
"name": "CVE-2025-29087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29087"
},
{
"name": "CVE-2025-3277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3277"
},
{
"name": "CVE-2025-4609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4609"
},
{
"name": "CVE-2025-4664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4664"
},
{
"name": "CVE-2025-4372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4372"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-4918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4918"
},
{
"name": "CVE-2025-4919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4919"
},
{
"name": "CVE-2025-41232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41232"
},
{
"name": "CVE-2025-23165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23165"
},
{
"name": "CVE-2025-23166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23166"
},
{
"name": "CVE-2025-5063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5063"
},
{
"name": "CVE-2025-5064",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5064"
},
{
"name": "CVE-2025-5065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5065"
},
{
"name": "CVE-2025-5066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5066"
},
{
"name": "CVE-2025-5067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5067"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2022-49728",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49728"
},
{
"name": "CVE-2024-58093",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58093"
},
{
"name": "CVE-2025-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22018"
},
{
"name": "CVE-2025-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22020"
},
{
"name": "CVE-2025-22062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22062"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-37798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37798"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-5263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5263"
},
{
"name": "CVE-2025-5264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5264"
},
{
"name": "CVE-2025-5265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5265"
},
{
"name": "CVE-2025-5266",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5266"
},
{
"name": "CVE-2025-5267",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5267"
},
{
"name": "CVE-2025-5268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5268"
},
{
"name": "CVE-2025-5270",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5270"
},
{
"name": "CVE-2025-5271",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5271"
},
{
"name": "CVE-2025-5272",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5272"
},
{
"name": "CVE-2025-5281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5281"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2025-22021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22021"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-37756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37756"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37797"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-37889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37889"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-37937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37937"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37890"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-37932",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37932"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2025-37964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37964"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2025-5068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5068"
},
{
"name": "CVE-2025-5419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5419"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2025-49709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49709"
},
{
"name": "CVE-2025-49710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49710"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-29088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29088"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-5958",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5958"
},
{
"name": "CVE-2025-5959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5959"
},
{
"name": "CVE-2025-41234",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41234"
},
{
"name": "CVE-2025-49146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49146"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-49124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49124"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-6191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6191"
},
{
"name": "CVE-2025-6192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6192"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2022-49168",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49168"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-6424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6424"
},
{
"name": "CVE-2025-6425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6425"
},
{
"name": "CVE-2025-6426",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6426"
},
{
"name": "CVE-2025-6427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6427"
},
{
"name": "CVE-2025-6429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6429"
},
{
"name": "CVE-2025-6430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6430"
},
{
"name": "CVE-2025-6432",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6432"
},
{
"name": "CVE-2025-6433",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6433"
},
{
"name": "CVE-2025-6434",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6434"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2025-6555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6555"
},
{
"name": "CVE-2025-6556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6556"
},
{
"name": "CVE-2025-6557",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6557"
},
{
"name": "CVE-2025-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6435"
},
{
"name": "CVE-2025-6436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6436"
},
{
"name": "CVE-2025-6554",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6554"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2022-49636",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49636"
},
{
"name": "CVE-2025-37997",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37997"
},
{
"name": "CVE-2025-38000",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38000"
},
{
"name": "CVE-2025-38001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38001"
},
{
"name": "CVE-2025-32462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32462"
},
{
"name": "CVE-2025-52520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52520"
},
{
"name": "CVE-2025-53506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53506"
},
{
"name": "CVE-2024-47081",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47081"
},
{
"name": "CVE-2025-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3576"
},
{
"name": "CVE-2025-47268",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47268"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38083"
},
{
"name": "CVE-2025-22227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22227"
},
{
"name": "CVE-2025-6558",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6558"
},
{
"name": "CVE-2025-7656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7656"
},
{
"name": "CVE-2025-7657",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7657"
},
{
"name": "CVE-2025-30749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30749"
},
{
"name": "CVE-2025-30754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30754"
},
{
"name": "CVE-2025-50059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50059"
},
{
"name": "CVE-2025-50106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50106"
},
{
"name": "CVE-2025-50088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2022-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21546"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-8010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8010"
},
{
"name": "CVE-2025-8011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8011"
},
{
"name": "CVE-2025-8027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8027"
},
{
"name": "CVE-2025-8028",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8028"
},
{
"name": "CVE-2025-8029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8029"
},
{
"name": "CVE-2025-8030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8030"
},
{
"name": "CVE-2025-8031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8031"
},
{
"name": "CVE-2025-8032",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8032"
},
{
"name": "CVE-2025-8033",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8033"
},
{
"name": "CVE-2025-8034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8034"
},
{
"name": "CVE-2025-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8035"
},
{
"name": "CVE-2025-8036",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8036"
},
{
"name": "CVE-2025-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8037"
},
{
"name": "CVE-2025-8038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8038"
},
{
"name": "CVE-2025-8039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8039"
},
{
"name": "CVE-2025-8040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8040"
},
{
"name": "CVE-2025-8041",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8041"
},
{
"name": "CVE-2025-8043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8043"
},
{
"name": "CVE-2025-8044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8044"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2024-45339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45339"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38177"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-4877",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4877"
},
{
"name": "CVE-2025-4878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4878"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2025-5318",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5318"
},
{
"name": "CVE-2025-5372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5372"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-8292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8292"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-8576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8576"
},
{
"name": "CVE-2025-8577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8577"
},
{
"name": "CVE-2025-8578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8578"
},
{
"name": "CVE-2025-8579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8579"
},
{
"name": "CVE-2025-8580",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8580"
},
{
"name": "CVE-2025-8581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8581"
},
{
"name": "CVE-2025-8582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8582"
},
{
"name": "CVE-2025-8583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8583"
},
{
"name": "CVE-2025-27210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27210"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-8879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8879"
},
{
"name": "CVE-2025-8880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8880"
},
{
"name": "CVE-2025-8881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8881"
},
{
"name": "CVE-2025-8882",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8882"
},
{
"name": "CVE-2025-8901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8901"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2024-25260",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25260"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-48964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48964"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2025-9132",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9132"
},
{
"name": "CVE-2025-54988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54988"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2025-55668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55668"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-52999",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52999"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2025-9288",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9288"
},
{
"name": "CVE-2005-2541",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-2541"
},
{
"name": "CVE-2008-5727",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5727"
},
{
"name": "CVE-2008-5728",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5728"
},
{
"name": "CVE-2008-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5729"
},
{
"name": "CVE-2008-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5730"
},
{
"name": "CVE-2008-5742",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5742"
},
{
"name": "CVE-2011-3374",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3374"
},
{
"name": "CVE-2014-4715",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4715"
},
{
"name": "CVE-2015-2214",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2214"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2016-2149",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2149"
},
{
"name": "CVE-2016-2160",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2160"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2017-12195",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12195"
},
{
"name": "CVE-2017-12629",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12629"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2018-1000169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000169"
},
{
"name": "CVE-2018-1196",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1196"
},
{
"name": "CVE-2018-1273",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1273"
},
{
"name": "CVE-2019-10782",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10782"
},
{
"name": "CVE-2019-9658",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9658"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2021-20298",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20298"
},
{
"name": "CVE-2021-20304",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20304"
},
{
"name": "CVE-2021-22055",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22055"
},
{
"name": "CVE-2021-23169",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23169"
},
{
"name": "CVE-2021-3236",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3236"
},
{
"name": "CVE-2022-0635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0635"
},
{
"name": "CVE-2022-0667",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0667"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2022-39046",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-39046"
},
{
"name": "CVE-2022-42010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42010"
},
{
"name": "CVE-2022-42011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42011"
},
{
"name": "CVE-2022-42012",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42012"
},
{
"name": "CVE-2022-44638",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44638"
},
{
"name": "CVE-2023-31437",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31437"
},
{
"name": "CVE-2023-31438",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31438"
},
{
"name": "CVE-2023-31439",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31439"
},
{
"name": "CVE-2023-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37769"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2023-4320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4320"
},
{
"name": "CVE-2023-43785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43785"
},
{
"name": "CVE-2023-43786",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43786"
},
{
"name": "CVE-2023-43787",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43787"
},
{
"name": "CVE-2023-46129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46129"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2023-5189",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5189"
},
{
"name": "CVE-2024-11584",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11584"
},
{
"name": "CVE-2024-21742",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21742"
},
{
"name": "CVE-2024-22047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22047"
},
{
"name": "CVE-2024-2397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2397"
},
{
"name": "CVE-2024-26462",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26462"
},
{
"name": "CVE-2024-31047",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-31047"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2024-6174",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6174"
},
{
"name": "CVE-2024-7012",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7012"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-24294",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24294"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-31672",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31672"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2025-43857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43857"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-46392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46392"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-5278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5278"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2025-6297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6297"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-8262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8262"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-9179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9179"
},
{
"name": "CVE-2025-9180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9180"
},
{
"name": "CVE-2025-9181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9181"
},
{
"name": "CVE-2025-9182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9182"
},
{
"name": "CVE-2025-9183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9183"
},
{
"name": "CVE-2025-9184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9184"
},
{
"name": "CVE-2025-9185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9185"
},
{
"name": "CVE-2025-9187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9187"
},
{
"name": "CVE-2025-9308",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9308"
}
],
"initial_release_date": "2025-09-05T00:00:00",
"last_revision_date": "2025-09-05T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0756",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-09-05T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36093"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36102"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36101"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36100"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36105",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36105"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36091",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36091"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36078"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36107",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36107"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36094"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36097"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-46",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36104"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36108",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36108"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36095"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-09",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36090"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36096"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36106",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36106"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36109"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36098"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-68",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36111"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36103",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36103"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36099"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36092"
},
{
"published_at": "2025-09-04",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36110"
}
]
}
CERTFR-2025-AVI-0524
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans VMware Tanzu. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Greenplum | Tanzu Greenplum Data Copy Utility versions antérieures à 2.8.0 | ||
| VMware | Tanzu | Tanzu Data Lake versions antérieures à 1.1.0 | ||
| VMware | Tanzu | Tanzu pour Postgres sur Kubernetes versions antérieures à 4.1.0 et 4.2.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Command Center versions antérieures à 6.14.0 et 7.4.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Backup and Restore versions antérieures à 1.31.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum Streaming Server versions antérieures à 2.1.0 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 6.x antérieures à 6.29.1 | ||
| VMware | Tanzu Greenplum | Tanzu Greenplum versions 7.x antérieures à 7.5.0 | ||
| VMware | Tanzu | VMware Tanzu pour Valkey sur Kubernetes versions antérieures à 1.1.0 et 2.0.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Tanzu Greenplum Data Copy Utility versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Data Lake versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres sur Kubernetes versions ant\u00e9rieures \u00e0 4.1.0 et 4.2.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Command Center versions ant\u00e9rieures \u00e0 6.14.0 et 7.4.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Backup and Restore versions ant\u00e9rieures \u00e0 1.31.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum Streaming Server versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 6.x ant\u00e9rieures \u00e0 6.29.1",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Greenplum versions 7.x ant\u00e9rieures \u00e0 7.5.0",
"product": {
"name": "Tanzu Greenplum",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Tanzu pour Valkey sur Kubernetes versions ant\u00e9rieures \u00e0 1.1.0 et 2.0.0",
"product": {
"name": "Tanzu",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-2126",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2126"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2019-12900",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12900"
},
{
"name": "CVE-2022-30633",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30633"
},
{
"name": "CVE-2022-1705",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1705"
},
{
"name": "CVE-2022-27664",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27664"
},
{
"name": "CVE-2022-28131",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28131"
},
{
"name": "CVE-2022-32148",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32148"
},
{
"name": "CVE-2022-32189",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32189"
},
{
"name": "CVE-2022-1962",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1962"
},
{
"name": "CVE-2022-30635",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30635"
},
{
"name": "CVE-2022-30631",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30631"
},
{
"name": "CVE-2022-30632",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30632"
},
{
"name": "CVE-2022-30630",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30630"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2021-45943",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45943"
},
{
"name": "CVE-2021-34141",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34141"
},
{
"name": "CVE-2022-1941",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1941"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2022-41862",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41862"
},
{
"name": "CVE-2022-41717",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41717"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2022-2879",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2879"
},
{
"name": "CVE-2022-41715",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41715"
},
{
"name": "CVE-2022-2880",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2880"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-30629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30629"
},
{
"name": "CVE-2022-41723",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41723"
},
{
"name": "CVE-2022-30580",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30580"
},
{
"name": "CVE-2022-40898",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40898"
},
{
"name": "CVE-2022-41725",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41725"
},
{
"name": "CVE-2022-41724",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41724"
},
{
"name": "CVE-2023-24532",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24532"
},
{
"name": "CVE-2023-24537",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24537"
},
{
"name": "CVE-2023-2455",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2455"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-24536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24536"
},
{
"name": "CVE-2023-24538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24538"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2023-24540",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24540"
},
{
"name": "CVE-2023-29400",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29400"
},
{
"name": "CVE-2023-24539",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24539"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2023-29404",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29404"
},
{
"name": "CVE-2023-29402",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29402"
},
{
"name": "CVE-2023-29403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29403"
},
{
"name": "CVE-2023-29405",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29405"
},
{
"name": "CVE-2023-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37920"
},
{
"name": "CVE-2023-29409",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29409"
},
{
"name": "CVE-2023-29406",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29406"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-4752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4752"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2023-5870",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5870"
},
{
"name": "CVE-2022-0543",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0543"
},
{
"name": "CVE-2023-4039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4039"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-4016",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4016"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-39323",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39323"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2023-24534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24534"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2023-39318",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39318"
},
{
"name": "CVE-2023-39319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39319"
},
{
"name": "CVE-2024-0727",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0727"
},
{
"name": "CVE-2024-1580",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1580"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2023-39326",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39326"
},
{
"name": "CVE-2023-45285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45285"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2023-45289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45289"
},
{
"name": "CVE-2023-45290",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45290"
},
{
"name": "CVE-2024-24783",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24783"
},
{
"name": "CVE-2024-24784",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24784"
},
{
"name": "CVE-2024-24785",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24785"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2024-23807",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23807"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2024-3596",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3596"
},
{
"name": "CVE-2024-26458",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26458"
},
{
"name": "CVE-2024-26461",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26461"
},
{
"name": "CVE-2024-35195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35195"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2024-22667",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22667"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2023-45287",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45287"
},
{
"name": "CVE-2024-24787",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24787"
},
{
"name": "CVE-2024-24788",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24788"
},
{
"name": "CVE-2024-7348",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7348"
},
{
"name": "CVE-2023-7008",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-7008"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2024-24789",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24789"
},
{
"name": "CVE-2024-34155",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34155"
},
{
"name": "CVE-2024-34156",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34156"
},
{
"name": "CVE-2024-34158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34158"
},
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2023-48161",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48161"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2024-10976",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10976"
},
{
"name": "CVE-2024-10977",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10977"
},
{
"name": "CVE-2024-10978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10978"
},
{
"name": "CVE-2024-10979",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10979"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2024-10963",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10963"
},
{
"name": "CVE-2025-21490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21490"
},
{
"name": "CVE-2025-21491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21491"
},
{
"name": "CVE-2025-21497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21497"
},
{
"name": "CVE-2025-21500",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21500"
},
{
"name": "CVE-2025-21501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21501"
},
{
"name": "CVE-2025-21503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21503"
},
{
"name": "CVE-2025-21505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21505"
},
{
"name": "CVE-2025-21519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21519"
},
{
"name": "CVE-2025-21522",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21522"
},
{
"name": "CVE-2025-21523",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21523"
},
{
"name": "CVE-2025-21529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21529"
},
{
"name": "CVE-2025-21540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21540"
},
{
"name": "CVE-2025-21546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21546"
},
{
"name": "CVE-2025-21555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21555"
},
{
"name": "CVE-2025-21559",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21559"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2024-24791",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24791"
},
{
"name": "CVE-2023-24531",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24531"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2022-42967",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-42967"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-31650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31650"
},
{
"name": "CVE-2025-31651",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31651"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-27363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27363"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-46701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46701"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2025-31115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31115"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2017-17507",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17507"
},
{
"name": "CVE-2017-8806",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-8806"
},
{
"name": "CVE-2018-10126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10126"
},
{
"name": "CVE-2018-11205",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11205"
},
{
"name": "CVE-2018-13866",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13866"
},
{
"name": "CVE-2018-13867",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13867"
},
{
"name": "CVE-2018-13868",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13868"
},
{
"name": "CVE-2018-13869",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13869"
},
{
"name": "CVE-2018-13870",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13870"
},
{
"name": "CVE-2018-13871",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13871"
},
{
"name": "CVE-2018-13872",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13872"
},
{
"name": "CVE-2018-13874",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13874"
},
{
"name": "CVE-2018-13875",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13875"
},
{
"name": "CVE-2018-13876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13876"
},
{
"name": "CVE-2018-14031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14031"
},
{
"name": "CVE-2018-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14033"
},
{
"name": "CVE-2018-14034",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14034"
},
{
"name": "CVE-2018-14035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14035"
},
{
"name": "CVE-2018-14460",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14460"
},
{
"name": "CVE-2018-15671",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15671"
},
{
"name": "CVE-2018-16438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16438"
},
{
"name": "CVE-2018-17432",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17432"
},
{
"name": "CVE-2018-17433",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17433"
},
{
"name": "CVE-2018-17434",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17434"
},
{
"name": "CVE-2018-17435",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17435"
},
{
"name": "CVE-2018-17436",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17436"
},
{
"name": "CVE-2018-17437",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17437"
},
{
"name": "CVE-2018-17438",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17438"
},
{
"name": "CVE-2018-17439",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17439"
},
{
"name": "CVE-2019-20005",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20005"
},
{
"name": "CVE-2019-20006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20006"
},
{
"name": "CVE-2019-20007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20007"
},
{
"name": "CVE-2019-20198",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20198"
},
{
"name": "CVE-2019-20199",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20199"
},
{
"name": "CVE-2019-20200",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20200"
},
{
"name": "CVE-2019-20201",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20201"
},
{
"name": "CVE-2019-20202",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20202"
},
{
"name": "CVE-2019-6988",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6988"
},
{
"name": "CVE-2019-8396",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8396"
},
{
"name": "CVE-2019-8397",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8397"
},
{
"name": "CVE-2019-8398",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8398"
},
{
"name": "CVE-2019-9151",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9151"
},
{
"name": "CVE-2019-9152",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9152"
},
{
"name": "CVE-2020-10809",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10809"
},
{
"name": "CVE-2020-10810",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10810"
},
{
"name": "CVE-2020-10811",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10811"
},
{
"name": "CVE-2020-10812",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10812"
},
{
"name": "CVE-2020-18232",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18232"
},
{
"name": "CVE-2020-18494",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18494"
},
{
"name": "CVE-2021-26220",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26220"
},
{
"name": "CVE-2021-26221",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26221"
},
{
"name": "CVE-2021-26222",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-26222"
},
{
"name": "CVE-2021-30485",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30485"
},
{
"name": "CVE-2021-31229",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31229"
},
{
"name": "CVE-2021-31347",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31347"
},
{
"name": "CVE-2021-31348",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31348"
},
{
"name": "CVE-2021-31598",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-31598"
},
{
"name": "CVE-2021-33430",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33430"
},
{
"name": "CVE-2021-37501",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37501"
},
{
"name": "CVE-2021-45829",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45829"
},
{
"name": "CVE-2021-45830",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45830"
},
{
"name": "CVE-2021-45832",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45832"
},
{
"name": "CVE-2021-45833",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45833"
},
{
"name": "CVE-2021-46242",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46242"
},
{
"name": "CVE-2021-46243",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46243"
},
{
"name": "CVE-2021-46244",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46244"
},
{
"name": "CVE-2022-25942",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25942"
},
{
"name": "CVE-2022-25972",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25972"
},
{
"name": "CVE-2022-26061",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26061"
},
{
"name": "CVE-2022-30045",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30045"
},
{
"name": "CVE-2022-4055",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4055"
},
{
"name": "CVE-2022-47655",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47655"
},
{
"name": "CVE-2023-0996",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0996"
},
{
"name": "CVE-2023-29659",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29659"
},
{
"name": "CVE-2023-32570",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32570"
},
{
"name": "CVE-2023-39328",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39328"
},
{
"name": "CVE-2023-39329",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39329"
},
{
"name": "CVE-2023-51792",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51792"
},
{
"name": "CVE-2023-6879",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6879"
},
{
"name": "CVE-2024-27304",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27304"
},
{
"name": "CVE-2024-29157",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29157"
},
{
"name": "CVE-2024-29158",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29158"
},
{
"name": "CVE-2024-29159",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29159"
},
{
"name": "CVE-2024-29160",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29160"
},
{
"name": "CVE-2024-29161",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29161"
},
{
"name": "CVE-2024-29162",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29162"
},
{
"name": "CVE-2024-29163",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29163"
},
{
"name": "CVE-2024-29164",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29164"
},
{
"name": "CVE-2024-29165",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29165"
},
{
"name": "CVE-2024-29166",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29166"
},
{
"name": "CVE-2024-32605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32605"
},
{
"name": "CVE-2024-32606",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32606"
},
{
"name": "CVE-2024-32607",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32607"
},
{
"name": "CVE-2024-32608",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32608"
},
{
"name": "CVE-2024-32609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32609"
},
{
"name": "CVE-2024-32610",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32610"
},
{
"name": "CVE-2024-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32611"
},
{
"name": "CVE-2024-32612",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32612"
},
{
"name": "CVE-2024-32613",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32613"
},
{
"name": "CVE-2024-32614",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32614"
},
{
"name": "CVE-2024-32615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32615"
},
{
"name": "CVE-2024-32616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32616"
},
{
"name": "CVE-2024-32617",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32617"
},
{
"name": "CVE-2024-32618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32618"
},
{
"name": "CVE-2024-32619",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32619"
},
{
"name": "CVE-2024-32620",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32620"
},
{
"name": "CVE-2024-32621",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32621"
},
{
"name": "CVE-2024-32622",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32622"
},
{
"name": "CVE-2024-32623",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32623"
},
{
"name": "CVE-2024-32624",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-32624"
},
{
"name": "CVE-2024-33873",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33873"
},
{
"name": "CVE-2024-33874",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33874"
},
{
"name": "CVE-2024-33875",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33875"
},
{
"name": "CVE-2024-33876",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33876"
},
{
"name": "CVE-2024-33877",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33877"
},
{
"name": "CVE-2024-34402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34402"
},
{
"name": "CVE-2024-34403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34403"
},
{
"name": "CVE-2024-38949",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38949"
},
{
"name": "CVE-2024-38950",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38950"
},
{
"name": "CVE-2024-41996",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41996"
},
{
"name": "CVE-2024-45993",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45993"
},
{
"name": "CVE-2024-46981",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-46981"
},
{
"name": "CVE-2024-49203",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-49203"
},
{
"name": "CVE-2024-5171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5171"
},
{
"name": "CVE-2024-51741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51741"
},
{
"name": "CVE-2024-52522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52522"
},
{
"name": "CVE-2024-52616",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52616"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2024-53920",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53920"
},
{
"name": "CVE-2024-56378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56378"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2024-56826",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56826"
},
{
"name": "CVE-2024-56827",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56827"
},
{
"name": "CVE-2024-6716",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6716"
},
{
"name": "CVE-2025-2153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2153"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-23022",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23022"
},
{
"name": "CVE-2025-24528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24528"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
}
],
"initial_release_date": "2025-06-19T00:00:00",
"last_revision_date": "2025-06-19T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0524",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-19T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans VMware Tanzu. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans VMware Tanzu",
"vendor_advisories": [
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35841",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35841"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35844",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35844"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35843",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35843"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35842",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35842"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35846",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35846"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35849",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35849"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35840",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35840"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35847",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35847"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35839",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35839"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35845",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35845"
},
{
"published_at": "2025-06-18",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 35848",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/35848"
}
]
}
CERTFR-2025-AVI-0532
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Splunk. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Splunk | Universal Forwarder | Universal Forwarder versions 9.3.x antérieures à 9.3.4 | ||
| Splunk | Splunk Operator for Kubernetes | Splunk Operator for Kubernetes versions antérieures à 2.8.0 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.2.x antérieures à 9.2.6 | ||
| Splunk | Splunk | Splunk versions 9.3.x antérieures à 9.3.4 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.4.x antérieures à 9.4.2 | ||
| Splunk | Universal Forwarder | Universal Forwarder versions 9.1.x antérieures à 9.1.9 | ||
| Splunk | Splunk | Splunk versions 9.1.x antérieures à 9.1.9 | ||
| Splunk | Splunk | Splunk versions 9.2.x antérieures à 9.2.6 | ||
| Splunk | Splunk | Splunk versions 9.4.x antérieures à 9.4.2 | ||
| Splunk | Splunk AppDynamics Smart Agent | Splunk AppDynamics Smart Agent versions antérieures à 25.5.1 |
| Title | Publication Time | Tags | ||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Universal Forwarder versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk Operator for Kubernetes versions ant\u00e9rieures \u00e0 2.8.0",
"product": {
"name": "Splunk Operator for Kubernetes",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk versions 9.3.x ant\u00e9rieures \u00e0 9.3.4",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Universal Forwarder versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
"product": {
"name": "Universal Forwarder",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk versions 9.1.x ant\u00e9rieures \u00e0 9.1.9",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk versions 9.2.x ant\u00e9rieures \u00e0 9.2.6",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk versions 9.4.x ant\u00e9rieures \u00e0 9.4.2",
"product": {
"name": "Splunk",
"vendor": {
"name": "Splunk",
"scada": false
}
}
},
{
"description": "Splunk AppDynamics Smart Agent versions ant\u00e9rieures \u00e0 25.5.1",
"product": {
"name": "Splunk AppDynamics Smart Agent",
"vendor": {
"name": "Splunk",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2024-24790",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24790"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2024-45341",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45341"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-22866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22866"
},
{
"name": "CVE-2024-45336",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45336"
},
{
"name": "CVE-2024-41110",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41110"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
}
],
"initial_release_date": "2025-06-24T00:00:00",
"last_revision_date": "2025-06-24T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0532",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-06-24T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Splunk. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Splunk",
"vendor_advisories": [
{
"published_at": "2025-06-23",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0607",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0607"
},
{
"published_at": "2025-06-23",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0610",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0610"
},
{
"published_at": "2025-06-23",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0608",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0608"
},
{
"published_at": "2025-06-23",
"title": "Bulletin de s\u00e9curit\u00e9 Splunk SVD-2025-0609",
"url": "https://advisory.splunk.com/advisories/SVD-2025-0609"
}
]
}
ghsa-vvgc-356p-c3xw
Vulnerability from github
The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. , , etc contexts).
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "golang.org/x/net"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.38.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2025-22872"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": true,
"github_reviewed_at": "2025-04-16T19:22:51Z",
"nvd_published_at": "2025-04-16T18:16:04Z",
"severity": "MODERATE"
},
"details": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts).",
"id": "GHSA-vvgc-356p-c3xw",
"modified": "2025-05-17T18:49:25Z",
"published": "2025-04-16T19:22:51Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22872"
},
{
"type": "WEB",
"url": "https://go.dev/cl/662715"
},
{
"type": "WEB",
"url": "https://go.dev/issue/73070"
},
{
"type": "WEB",
"url": "https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2025-3595"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20250516-0007"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:N/SC:L/SI:L/SA:N",
"type": "CVSS_V4"
}
],
"summary": "golang.org/x/net vulnerable to Cross-site Scripting"
}
fkie_cve-2025-22872
Vulnerability from fkie_nvd
| URL | Tags | ||
|---|---|---|---|
| security@golang.org | https://go.dev/cl/662715 | ||
| security@golang.org | https://go.dev/issue/73070 | ||
| security@golang.org | https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA | ||
| security@golang.org | https://pkg.go.dev/vuln/GO-2025-3595 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20250516-0007/ |
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The tokenizer incorrectly interprets tags with unquoted attribute values that end with a solidus character (/) as self-closing. When directly using Tokenizer, this can result in such tags incorrectly being marked as self-closing, and when using the Parse functions, this can result in content following such tags as being placed in the wrong scope during DOM construction, but only when tags are in foreign content (e.g. \u003cmath\u003e, \u003csvg\u003e, etc contexts)."
},
{
"lang": "es",
"value": "El tokenizador interpreta incorrectamente las etiquetas con valores de atributo sin comillas que terminan en barra (/) como autocerradas. Al usar el tokenizador directamente, esto puede provocar que dichas etiquetas se marquen incorrectamente como autocerradas, y al usar las funciones de an\u00e1lisis, esto puede provocar que el contenido posterior a dichas etiquetas se coloque en el \u00e1mbito incorrecto durante la construcci\u00f3n del DOM, pero solo cuando las etiquetas se encuentran en contenido externo (por ejemplo, contextos , , etc.)."
}
],
"id": "CVE-2025-22872",
"lastModified": "2025-05-16T23:15:19.707",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.2,
"impactScore": 3.7,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2025-04-16T18:16:04.183",
"references": [
{
"source": "security@golang.org",
"url": "https://go.dev/cl/662715"
},
{
"source": "security@golang.org",
"url": "https://go.dev/issue/73070"
},
{
"source": "security@golang.org",
"url": "https://groups.google.com/g/golang-announce/c/ezSKR9vqbqA"
},
{
"source": "security@golang.org",
"url": "https://pkg.go.dev/vuln/GO-2025-3595"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20250516-0007/"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Awaiting Analysis"
}
msrc_cve-2025-22872
Vulnerability from csaf_microsoft
Notes
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22872 Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-22872.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net",
"tracking": {
"current_release_date": "2025-07-10T00:00:00.000Z",
"generator": {
"date": "2025-10-20T03:11:13.555Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-22872",
"initial_release_date": "2025-04-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-04-29T00:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-05-05T00:00:00.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-05-27T00:00:00.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-06-06T00:00:00.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Added packer to CBL-Mariner 2.0\nAdded cni-plugins to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded cni-plugins to Azure Linux 3.0\nAdded helm to Azure Linux 3.0\nAdded ig to Azure Linux 3.0\nAdded influxdb to Azure Linux 3.0\nAdded kubernetes to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded telegraf to Azure Linux 3.0\nAdded cf-cli to Azure Linux 3.0\nAdded containerized-data-importer to Azure Linux 3.0\nAdded docker-compose to Azure Linux 3.0\nAdded gh to Azure Linux 3.0\nAdded kube-vip-cloud-provider to Azure Linux 3.0\nAdded packer to Azure Linux 3.0\nAdded prometheus-adapter to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded keda to Azure Linux 3.0"
},
{
"date": "2025-07-10T00:00:00.000Z",
"legacy_version": "5",
"number": "5",
"summary": "Added cert-manager to CBL-Mariner 2.0\nAdded helm to CBL-Mariner 2.0\nAdded kubernetes to CBL-Mariner 2.0\nAdded multus to CBL-Mariner 2.0\nAdded telegraf to CBL-Mariner 2.0\nAdded vitess to CBL-Mariner 2.0\nAdded packer to CBL-Mariner 2.0\nAdded cni-plugins to CBL-Mariner 2.0\nAdded kubevirt to CBL-Mariner 2.0\nAdded sriov-network-device-plugin to CBL-Mariner 2.0\nAdded cert-manager to Azure Linux 3.0\nAdded containerd2 to Azure Linux 3.0\nAdded dasel to Azure Linux 3.0\nAdded docker-buildx to Azure Linux 3.0\nAdded cni-plugins to Azure Linux 3.0\nAdded helm to Azure Linux 3.0\nAdded ig to Azure Linux 3.0\nAdded influxdb to Azure Linux 3.0\nAdded kubernetes to Azure Linux 3.0\nAdded kubevirt to Azure Linux 3.0\nAdded multus to Azure Linux 3.0\nAdded telegraf to Azure Linux 3.0\nAdded cf-cli to Azure Linux 3.0\nAdded containerized-data-importer to Azure Linux 3.0\nAdded docker-compose to Azure Linux 3.0\nAdded gh to Azure Linux 3.0\nAdded kube-vip-cloud-provider to Azure Linux 3.0\nAdded packer to Azure Linux 3.0\nAdded prometheus-adapter to Azure Linux 3.0\nAdded sriov-network-device-plugin to Azure Linux 3.0\nAdded keda to Azure Linux 3.0"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 cri-tools 1.32.0-2",
"product": {
"name": "\u003cazl3 cri-tools 1.32.0-2",
"product_id": "8"
}
},
{
"category": "product_version",
"name": "azl3 cri-tools 1.32.0-2",
"product": {
"name": "azl3 cri-tools 1.32.0-2",
"product_id": "20303"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 cri-tools 1.29.0-8",
"product": {
"name": "\u003ccbl2 cri-tools 1.29.0-8",
"product_id": "3"
}
},
{
"category": "product_version",
"name": "cbl2 cri-tools 1.29.0-8",
"product": {
"name": "cbl2 cri-tools 1.29.0-8",
"product_id": "20382"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 cri-tools 1.29.0-6",
"product": {
"name": "\u003ccbl2 cri-tools 1.29.0-6",
"product_id": "18"
}
},
{
"category": "product_version",
"name": "cbl2 cri-tools 1.29.0-6",
"product": {
"name": "cbl2 cri-tools 1.29.0-6",
"product_id": "19754"
}
}
],
"category": "product_name",
"name": "cri-tools"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 docker-buildx 0.14.0-6",
"product": {
"name": "\u003cazl3 docker-buildx 0.14.0-6",
"product_id": "7"
}
},
{
"category": "product_version",
"name": "azl3 docker-buildx 0.14.0-6",
"product": {
"name": "azl3 docker-buildx 0.14.0-6",
"product_id": "20305"
}
}
],
"category": "product_name",
"name": "docker-buildx"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 cert-manager 1.11.2-23",
"product": {
"name": "\u003ccbl2 cert-manager 1.11.2-23",
"product_id": "9"
}
},
{
"category": "product_version",
"name": "cbl2 cert-manager 1.11.2-23",
"product": {
"name": "cbl2 cert-manager 1.11.2-23",
"product_id": "20252"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cert-manager 1.12.15-4",
"product": {
"name": "\u003cazl3 cert-manager 1.12.15-4",
"product_id": "22"
}
},
{
"category": "product_version",
"name": "azl3 cert-manager 1.12.15-4",
"product": {
"name": "azl3 cert-manager 1.12.15-4",
"product_id": "19594"
}
}
],
"category": "product_name",
"name": "cert-manager"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 containerd2 2.0.0-12",
"product": {
"name": "\u003cazl3 containerd2 2.0.0-12",
"product_id": "21"
}
},
{
"category": "product_version",
"name": "azl3 containerd2 2.0.0-12",
"product": {
"name": "azl3 containerd2 2.0.0-12",
"product_id": "19609"
}
}
],
"category": "product_name",
"name": "containerd2"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 cni-plugins 1.3.0-8",
"product": {
"name": "\u003ccbl2 cni-plugins 1.3.0-8",
"product_id": "12"
}
},
{
"category": "product_version",
"name": "cbl2 cni-plugins 1.3.0-8",
"product": {
"name": "cbl2 cni-plugins 1.3.0-8",
"product_id": "19969"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 cni-plugins 1.4.0-3",
"product": {
"name": "\u003cazl3 cni-plugins 1.4.0-3",
"product_id": "24"
}
},
{
"category": "product_version",
"name": "azl3 cni-plugins 1.4.0-3",
"product": {
"name": "azl3 cni-plugins 1.4.0-3",
"product_id": "19348"
}
}
],
"category": "product_name",
"name": "cni-plugins"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 helm 3.14.2-6",
"product": {
"name": "\u003ccbl2 helm 3.14.2-6",
"product_id": "13"
}
},
{
"category": "product_version",
"name": "cbl2 helm 3.14.2-6",
"product": {
"name": "cbl2 helm 3.14.2-6",
"product_id": "19963"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 helm 3.15.2-3",
"product": {
"name": "\u003cazl3 helm 3.15.2-3",
"product_id": "39"
}
},
{
"category": "product_version",
"name": "azl3 helm 3.15.2-3",
"product": {
"name": "azl3 helm 3.15.2-3",
"product_id": "19333"
}
}
],
"category": "product_name",
"name": "helm"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 multus 4.0.2-8",
"product": {
"name": "\u003ccbl2 multus 4.0.2-8",
"product_id": "6"
}
},
{
"category": "product_version",
"name": "cbl2 multus 4.0.2-8",
"product": {
"name": "cbl2 multus 4.0.2-8",
"product_id": "20312"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 multus 4.0.2-5",
"product": {
"name": "\u003cazl3 multus 4.0.2-5",
"product_id": "27"
}
},
{
"category": "product_version",
"name": "azl3 multus 4.0.2-5",
"product": {
"name": "azl3 multus 4.0.2-5",
"product_id": "19345"
}
}
],
"category": "product_name",
"name": "multus"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 telegraf 1.29.4-16",
"product": {
"name": "\u003ccbl2 telegraf 1.29.4-16",
"product_id": "15"
}
},
{
"category": "product_version",
"name": "cbl2 telegraf 1.29.4-16",
"product": {
"name": "cbl2 telegraf 1.29.4-16",
"product_id": "19939"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 telegraf 1.31.0-10",
"product": {
"name": "\u003cazl3 telegraf 1.31.0-10",
"product_id": "29"
}
},
{
"category": "product_version",
"name": "azl3 telegraf 1.31.0-10",
"product": {
"name": "azl3 telegraf 1.31.0-10",
"product_id": "19343"
}
}
],
"category": "product_name",
"name": "telegraf"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 sriov-network-device-plugin 3.6.2-9",
"product": {
"name": "\u003ccbl2 sriov-network-device-plugin 3.6.2-9",
"product_id": "20"
}
},
{
"category": "product_version",
"name": "cbl2 sriov-network-device-plugin 3.6.2-9",
"product": {
"name": "cbl2 sriov-network-device-plugin 3.6.2-9",
"product_id": "19680"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-4",
"product": {
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-4",
"product_id": "31"
}
},
{
"category": "product_version",
"name": "azl3 sriov-network-device-plugin 3.7.0-4",
"product": {
"name": "azl3 sriov-network-device-plugin 3.7.0-4",
"product_id": "19341"
}
}
],
"category": "product_name",
"name": "sriov-network-device-plugin"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-2",
"product": {
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-2",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 nvidia-container-toolkit 1.17.8-2",
"product": {
"name": "azl3 nvidia-container-toolkit 1.17.8-2",
"product_id": "20433"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-1",
"product": {
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-1",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 nvidia-container-toolkit 1.17.8-1",
"product": {
"name": "cbl2 nvidia-container-toolkit 1.17.8-1",
"product_id": "20319"
}
},
{
"category": "product_version_range",
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-1",
"product": {
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-1",
"product_id": "4"
}
},
{
"category": "product_version",
"name": "azl3 nvidia-container-toolkit 1.17.8-1",
"product": {
"name": "azl3 nvidia-container-toolkit 1.17.8-1",
"product_id": "20321"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-3",
"product": {
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-3",
"product_id": "2"
}
},
{
"category": "product_version",
"name": "cbl2 nvidia-container-toolkit 1.17.8-3",
"product": {
"name": "cbl2 nvidia-container-toolkit 1.17.8-3",
"product_id": "20383"
}
}
],
"category": "product_name",
"name": "nvidia-container-toolkit"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kube-vip-cloud-provider 0.0.10-4",
"product": {
"name": "\u003cazl3 kube-vip-cloud-provider 0.0.10-4",
"product_id": "40"
}
},
{
"category": "product_version",
"name": "azl3 kube-vip-cloud-provider 0.0.10-4",
"product": {
"name": "azl3 kube-vip-cloud-provider 0.0.10-4",
"product_id": "19332"
}
}
],
"category": "product_name",
"name": "kube-vip-cloud-provider"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 docker-compose 2.27.0-5",
"product": {
"name": "\u003cazl3 docker-compose 2.27.0-5",
"product_id": "38"
}
},
{
"category": "product_version",
"name": "azl3 docker-compose 2.27.0-5",
"product": {
"name": "azl3 docker-compose 2.27.0-5",
"product_id": "19334"
}
}
],
"category": "product_name",
"name": "docker-compose"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 packer 1.9.5-9",
"product": {
"name": "\u003cazl3 packer 1.9.5-9",
"product_id": "37"
}
},
{
"category": "product_version",
"name": "azl3 packer 1.9.5-9",
"product": {
"name": "azl3 packer 1.9.5-9",
"product_id": "19335"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 packer 1.9.5-13",
"product": {
"name": "\u003ccbl2 packer 1.9.5-13",
"product_id": "14"
}
},
{
"category": "product_version",
"name": "cbl2 packer 1.9.5-13",
"product": {
"name": "cbl2 packer 1.9.5-13",
"product_id": "19945"
}
}
],
"category": "product_name",
"name": "packer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 prometheus-adapter 0.12.0-3",
"product": {
"name": "\u003cazl3 prometheus-adapter 0.12.0-3",
"product_id": "36"
}
},
{
"category": "product_version",
"name": "azl3 prometheus-adapter 0.12.0-3",
"product": {
"name": "azl3 prometheus-adapter 0.12.0-3",
"product_id": "19336"
}
}
],
"category": "product_name",
"name": "prometheus-adapter"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 cf-cli 8.7.11-3",
"product": {
"name": "\u003cazl3 cf-cli 8.7.11-3",
"product_id": "35"
}
},
{
"category": "product_version",
"name": "azl3 cf-cli 8.7.11-3",
"product": {
"name": "azl3 cf-cli 8.7.11-3",
"product_id": "19337"
}
}
],
"category": "product_name",
"name": "cf-cli"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 gh 2.62.0-8",
"product": {
"name": "\u003cazl3 gh 2.62.0-8",
"product_id": "34"
}
},
{
"category": "product_version",
"name": "azl3 gh 2.62.0-8",
"product": {
"name": "azl3 gh 2.62.0-8",
"product_id": "19338"
}
}
],
"category": "product_name",
"name": "gh"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kubevirt 1.2.0-17",
"product": {
"name": "\u003cazl3 kubevirt 1.2.0-17",
"product_id": "33"
}
},
{
"category": "product_version",
"name": "azl3 kubevirt 1.2.0-17",
"product": {
"name": "azl3 kubevirt 1.2.0-17",
"product_id": "19339"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kubevirt 0.59.0-28",
"product": {
"name": "\u003ccbl2 kubevirt 0.59.0-28",
"product_id": "16"
}
},
{
"category": "product_version",
"name": "cbl2 kubevirt 0.59.0-28",
"product": {
"name": "cbl2 kubevirt 0.59.0-28",
"product_id": "19782"
}
}
],
"category": "product_name",
"name": "kubevirt"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 kubernetes 1.30.10-7",
"product": {
"name": "\u003cazl3 kubernetes 1.30.10-7",
"product_id": "32"
}
},
{
"category": "product_version",
"name": "azl3 kubernetes 1.30.10-7",
"product": {
"name": "azl3 kubernetes 1.30.10-7",
"product_id": "19340"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 kubernetes 1.28.4-18",
"product": {
"name": "\u003ccbl2 kubernetes 1.28.4-18",
"product_id": "17"
}
},
{
"category": "product_version",
"name": "cbl2 kubernetes 1.28.4-18",
"product": {
"name": "cbl2 kubernetes 1.28.4-18",
"product_id": "19761"
}
}
],
"category": "product_name",
"name": "kubernetes"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 ig 0.37.0-4",
"product": {
"name": "\u003cazl3 ig 0.37.0-4",
"product_id": "30"
}
},
{
"category": "product_version",
"name": "azl3 ig 0.37.0-4",
"product": {
"name": "azl3 ig 0.37.0-4",
"product_id": "19342"
}
}
],
"category": "product_name",
"name": "ig"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 influxdb 2.7.5-5",
"product": {
"name": "\u003cazl3 influxdb 2.7.5-5",
"product_id": "28"
}
},
{
"category": "product_version",
"name": "azl3 influxdb 2.7.5-5",
"product": {
"name": "azl3 influxdb 2.7.5-5",
"product_id": "19344"
}
}
],
"category": "product_name",
"name": "influxdb"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 containerized-data-importer 1.57.0-14",
"product": {
"name": "\u003cazl3 containerized-data-importer 1.57.0-14",
"product_id": "26"
}
},
{
"category": "product_version",
"name": "azl3 containerized-data-importer 1.57.0-14",
"product": {
"name": "azl3 containerized-data-importer 1.57.0-14",
"product_id": "19346"
}
}
],
"category": "product_name",
"name": "containerized-data-importer"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 keda 2.14.1-7",
"product": {
"name": "\u003cazl3 keda 2.14.1-7",
"product_id": "25"
}
},
{
"category": "product_version",
"name": "azl3 keda 2.14.1-7",
"product": {
"name": "azl3 keda 2.14.1-7",
"product_id": "19347"
}
}
],
"category": "product_name",
"name": "keda"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003ccbl2 vitess 17.0.7-8",
"product": {
"name": "\u003ccbl2 vitess 17.0.7-8",
"product_id": "19"
}
},
{
"category": "product_version",
"name": "cbl2 vitess 17.0.7-8",
"product": {
"name": "cbl2 vitess 17.0.7-8",
"product_id": "19698"
}
}
],
"category": "product_name",
"name": "vitess"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 dasel 2.8.1-2",
"product": {
"name": "\u003cazl3 dasel 2.8.1-2",
"product_id": "10"
}
},
{
"category": "product_version",
"name": "azl3 dasel 2.8.1-2",
"product": {
"name": "azl3 dasel 2.8.1-2",
"product_id": "20004"
}
}
],
"category": "product_name",
"name": "dasel"
},
{
"category": "product_name",
"name": "azl3 node-problem-detector 0.8.20-2",
"product": {
"name": "azl3 node-problem-detector 0.8.20-2",
"product_id": "41"
}
},
{
"category": "product_name",
"name": "azl3 libcontainers-common 20240213-3",
"product": {
"name": "azl3 libcontainers-common 20240213-3",
"product_id": "42"
}
},
{
"category": "product_name",
"name": "azl3 application-gateway-kubernetes-ingress 1.7.7-2",
"product": {
"name": "azl3 application-gateway-kubernetes-ingress 1.7.7-2",
"product_id": "23"
}
},
{
"category": "product_name",
"name": "azl3 cloud-provider-kubevirt 0.5.1-1",
"product": {
"name": "azl3 cloud-provider-kubevirt 0.5.1-1",
"product_id": "11"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cri-tools 1.32.0-2 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cri-tools 1.32.0-2 as a component of Azure Linux 3.0",
"product_id": "20303-17084"
},
"product_reference": "20303",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 docker-buildx 0.14.0-6 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 docker-buildx 0.14.0-6 as a component of Azure Linux 3.0",
"product_id": "20305-17084"
},
"product_reference": "20305",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cert-manager 1.11.2-23 as a component of CBL Mariner 2.0",
"product_id": "17086-9"
},
"product_reference": "9",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cert-manager 1.11.2-23 as a component of CBL Mariner 2.0",
"product_id": "20252-17086"
},
"product_reference": "20252",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 containerd2 2.0.0-12 as a component of Azure Linux 3.0",
"product_id": "17084-21"
},
"product_reference": "21",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 containerd2 2.0.0-12 as a component of Azure Linux 3.0",
"product_id": "19609-17084"
},
"product_reference": "19609",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cni-plugins 1.3.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-12"
},
"product_reference": "12",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cni-plugins 1.3.0-8 as a component of CBL Mariner 2.0",
"product_id": "19969-17086"
},
"product_reference": "19969",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 node-problem-detector 0.8.20-2 as a component of Azure Linux 3.0",
"product_id": "17084-41"
},
"product_reference": "41",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cert-manager 1.12.15-4 as a component of Azure Linux 3.0",
"product_id": "17084-22"
},
"product_reference": "22",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cert-manager 1.12.15-4 as a component of Azure Linux 3.0",
"product_id": "19594-17084"
},
"product_reference": "19594",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 helm 3.14.2-6 as a component of CBL Mariner 2.0",
"product_id": "17086-13"
},
"product_reference": "13",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 helm 3.14.2-6 as a component of CBL Mariner 2.0",
"product_id": "19963-17086"
},
"product_reference": "19963",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 multus 4.0.2-8 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 multus 4.0.2-8 as a component of CBL Mariner 2.0",
"product_id": "20312-17086"
},
"product_reference": "20312",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 telegraf 1.29.4-16 as a component of CBL Mariner 2.0",
"product_id": "17086-15"
},
"product_reference": "15",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 telegraf 1.29.4-16 as a component of CBL Mariner 2.0",
"product_id": "19939-17086"
},
"product_reference": "19939",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 sriov-network-device-plugin 3.6.2-9 as a component of CBL Mariner 2.0",
"product_id": "17086-20"
},
"product_reference": "20",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 sriov-network-device-plugin 3.6.2-9 as a component of CBL Mariner 2.0",
"product_id": "19680-17086"
},
"product_reference": "19680",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cri-tools 1.29.0-8 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cri-tools 1.29.0-8 as a component of CBL Mariner 2.0",
"product_id": "20382-17086"
},
"product_reference": "20382",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-2 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 nvidia-container-toolkit 1.17.8-2 as a component of Azure Linux 3.0",
"product_id": "20433-17084"
},
"product_reference": "20433",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kube-vip-cloud-provider 0.0.10-4 as a component of Azure Linux 3.0",
"product_id": "17084-40"
},
"product_reference": "40",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kube-vip-cloud-provider 0.0.10-4 as a component of Azure Linux 3.0",
"product_id": "19332-17084"
},
"product_reference": "19332",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 helm 3.15.2-3 as a component of Azure Linux 3.0",
"product_id": "17084-39"
},
"product_reference": "39",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 helm 3.15.2-3 as a component of Azure Linux 3.0",
"product_id": "19333-17084"
},
"product_reference": "19333",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 docker-compose 2.27.0-5 as a component of Azure Linux 3.0",
"product_id": "17084-38"
},
"product_reference": "38",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 docker-compose 2.27.0-5 as a component of Azure Linux 3.0",
"product_id": "19334-17084"
},
"product_reference": "19334",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 packer 1.9.5-9 as a component of Azure Linux 3.0",
"product_id": "17084-37"
},
"product_reference": "37",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 packer 1.9.5-9 as a component of Azure Linux 3.0",
"product_id": "19335-17084"
},
"product_reference": "19335",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 prometheus-adapter 0.12.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-36"
},
"product_reference": "36",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 prometheus-adapter 0.12.0-3 as a component of Azure Linux 3.0",
"product_id": "19336-17084"
},
"product_reference": "19336",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cf-cli 8.7.11-3 as a component of Azure Linux 3.0",
"product_id": "17084-35"
},
"product_reference": "35",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cf-cli 8.7.11-3 as a component of Azure Linux 3.0",
"product_id": "19337-17084"
},
"product_reference": "19337",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 gh 2.62.0-8 as a component of Azure Linux 3.0",
"product_id": "17084-34"
},
"product_reference": "34",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 gh 2.62.0-8 as a component of Azure Linux 3.0",
"product_id": "19338-17084"
},
"product_reference": "19338",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kubevirt 1.2.0-17 as a component of Azure Linux 3.0",
"product_id": "17084-33"
},
"product_reference": "33",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kubevirt 1.2.0-17 as a component of Azure Linux 3.0",
"product_id": "19339-17084"
},
"product_reference": "19339",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 kubernetes 1.30.10-7 as a component of Azure Linux 3.0",
"product_id": "17084-32"
},
"product_reference": "32",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 kubernetes 1.30.10-7 as a component of Azure Linux 3.0",
"product_id": "19340-17084"
},
"product_reference": "19340",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 sriov-network-device-plugin 3.7.0-4 as a component of Azure Linux 3.0",
"product_id": "17084-31"
},
"product_reference": "31",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 sriov-network-device-plugin 3.7.0-4 as a component of Azure Linux 3.0",
"product_id": "19341-17084"
},
"product_reference": "19341",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 ig 0.37.0-4 as a component of Azure Linux 3.0",
"product_id": "17084-30"
},
"product_reference": "30",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 ig 0.37.0-4 as a component of Azure Linux 3.0",
"product_id": "19342-17084"
},
"product_reference": "19342",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "17084-29"
},
"product_reference": "29",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 telegraf 1.31.0-10 as a component of Azure Linux 3.0",
"product_id": "19343-17084"
},
"product_reference": "19343",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 influxdb 2.7.5-5 as a component of Azure Linux 3.0",
"product_id": "17084-28"
},
"product_reference": "28",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 influxdb 2.7.5-5 as a component of Azure Linux 3.0",
"product_id": "19344-17084"
},
"product_reference": "19344",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 multus 4.0.2-5 as a component of Azure Linux 3.0",
"product_id": "17084-27"
},
"product_reference": "27",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 multus 4.0.2-5 as a component of Azure Linux 3.0",
"product_id": "19345-17084"
},
"product_reference": "19345",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 containerized-data-importer 1.57.0-14 as a component of Azure Linux 3.0",
"product_id": "17084-26"
},
"product_reference": "26",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 containerized-data-importer 1.57.0-14 as a component of Azure Linux 3.0",
"product_id": "19346-17084"
},
"product_reference": "19346",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 keda 2.14.1-7 as a component of Azure Linux 3.0",
"product_id": "17084-25"
},
"product_reference": "25",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 keda 2.14.1-7 as a component of Azure Linux 3.0",
"product_id": "19347-17084"
},
"product_reference": "19347",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 cni-plugins 1.4.0-3 as a component of Azure Linux 3.0",
"product_id": "17084-24"
},
"product_reference": "24",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cni-plugins 1.4.0-3 as a component of Azure Linux 3.0",
"product_id": "19348-17084"
},
"product_reference": "19348",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libcontainers-common 20240213-3 as a component of Azure Linux 3.0",
"product_id": "17084-42"
},
"product_reference": "42",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 application-gateway-kubernetes-ingress 1.7.7-2 as a component of Azure Linux 3.0",
"product_id": "17084-23"
},
"product_reference": "23",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kubernetes 1.28.4-18 as a component of CBL Mariner 2.0",
"product_id": "17086-17"
},
"product_reference": "17",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kubernetes 1.28.4-18 as a component of CBL Mariner 2.0",
"product_id": "19761-17086"
},
"product_reference": "19761",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 cloud-provider-kubevirt 0.5.1-1 as a component of Azure Linux 3.0",
"product_id": "17084-11"
},
"product_reference": "11",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 kubevirt 0.59.0-28 as a component of CBL Mariner 2.0",
"product_id": "17086-16"
},
"product_reference": "16",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 kubevirt 0.59.0-28 as a component of CBL Mariner 2.0",
"product_id": "19782-17086"
},
"product_reference": "19782",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 cri-tools 1.29.0-6 as a component of CBL Mariner 2.0",
"product_id": "17086-18"
},
"product_reference": "18",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 cri-tools 1.29.0-6 as a component of CBL Mariner 2.0",
"product_id": "19754-17086"
},
"product_reference": "19754",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 vitess 17.0.7-8 as a component of CBL Mariner 2.0",
"product_id": "17086-19"
},
"product_reference": "19",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 vitess 17.0.7-8 as a component of CBL Mariner 2.0",
"product_id": "19698-17086"
},
"product_reference": "19698",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 packer 1.9.5-13 as a component of CBL Mariner 2.0",
"product_id": "17086-14"
},
"product_reference": "14",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 packer 1.9.5-13 as a component of CBL Mariner 2.0",
"product_id": "19945-17086"
},
"product_reference": "19945",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 dasel 2.8.1-2 as a component of Azure Linux 3.0",
"product_id": "17084-10"
},
"product_reference": "10",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 dasel 2.8.1-2 as a component of Azure Linux 3.0",
"product_id": "20004-17084"
},
"product_reference": "20004",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-1 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 nvidia-container-toolkit 1.17.8-1 as a component of CBL Mariner 2.0",
"product_id": "20319-17086"
},
"product_reference": "20319",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 nvidia-container-toolkit 1.17.8-1 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 nvidia-container-toolkit 1.17.8-1 as a component of Azure Linux 3.0",
"product_id": "20321-17084"
},
"product_reference": "20321",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 nvidia-container-toolkit 1.17.8-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 nvidia-container-toolkit 1.17.8-3 as a component of CBL Mariner 2.0",
"product_id": "20383-17086"
},
"product_reference": "20383",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22872",
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-41",
"17084-42",
"17084-23",
"17084-11"
]
}
],
"notes": [
{
"category": "general",
"text": "Go",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20303-17084",
"20305-17084",
"20252-17086",
"19609-17084",
"19969-17086",
"19594-17084",
"19963-17086",
"20312-17086",
"19939-17086",
"19680-17086",
"20382-17086",
"20433-17084",
"19332-17084",
"19333-17084",
"19334-17084",
"19335-17084",
"19336-17084",
"19337-17084",
"19338-17084",
"19339-17084",
"19340-17084",
"19341-17084",
"19342-17084",
"19343-17084",
"19344-17084",
"19345-17084",
"19346-17084",
"19347-17084",
"19348-17084",
"19761-17086",
"19782-17086",
"19754-17086",
"19698-17086",
"19945-17086",
"20004-17084",
"20319-17086",
"20321-17084",
"20383-17086"
],
"known_affected": [
"17084-8",
"17084-7",
"17086-9",
"17084-21",
"17086-12",
"17084-22",
"17086-13",
"17086-6",
"17086-15",
"17086-20",
"17086-3",
"17084-1",
"17084-40",
"17084-39",
"17084-38",
"17084-37",
"17084-36",
"17084-35",
"17084-34",
"17084-33",
"17084-32",
"17084-31",
"17084-30",
"17084-29",
"17084-28",
"17084-27",
"17084-26",
"17084-25",
"17084-24",
"17086-17",
"17086-16",
"17086-18",
"17086-19",
"17086-14",
"17084-10",
"17086-5",
"17084-4",
"17086-2"
],
"known_not_affected": [
"17084-41",
"17084-42",
"17084-23",
"17084-11"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22872 Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-22872.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.32.0-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-8"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "0.14.0-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-7"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.11.2-23:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-9"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.0.0-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-21"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.3.0-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-12"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.12.15-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-22"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "3.14.2-6:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-13"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "4.0.2-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-6"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.29.4-16:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-15"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "3.6.2-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-20"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.29.0-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-3"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.17.8-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17086-5",
"17084-4"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "0.0.10-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-40"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "3.15.2-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-39"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.27.0-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-38"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.9.5-9:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-37"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "0.12.0-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-36"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "8.7.11-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-35"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.62.0-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-34"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.2.0-17:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-33"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.30.10-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-32"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "3.7.0-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-31"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "0.37.0-4:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-30"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.31.0-10:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-29"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.7.5-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-28"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "4.0.2-5:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-27"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.57.0-14:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-26"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.14.1-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-25"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.4.0-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-24"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.28.4-18:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-17"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "0.59.0-28:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-16"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.29.0-7:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-18"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "17.0.7-8:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-19"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.9.5-13:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-14"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "2.8.1-2:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-10"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
},
{
"category": "vendor_fix",
"date": "2025-04-29T00:00:00.000Z",
"details": "1.17.8-3:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17086-2"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"temporalScore": 6.5,
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"17084-8",
"17084-7",
"17086-9",
"17084-21",
"17086-12",
"17084-22",
"17086-13",
"17086-6",
"17086-15",
"17086-20",
"17086-3",
"17084-1",
"17084-40",
"17084-39",
"17084-38",
"17084-37",
"17084-36",
"17084-35",
"17084-34",
"17084-33",
"17084-32",
"17084-31",
"17084-30",
"17084-29",
"17084-28",
"17084-27",
"17084-26",
"17084-25",
"17084-24",
"17086-17",
"17086-16",
"17086-18",
"17086-19",
"17086-14",
"17084-10",
"17086-5",
"17084-4",
"17086-2"
]
}
],
"title": "Incorrect Neutralization of Input During Web Page Generation in x/net in golang.org/x/net"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.