Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-8836 (GCVE-0-2025-8836)
Vulnerability from cvelistv5
Published
2025-08-11 07:32
Modified
2025-08-12 13:44
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-617 - Reachable Assertion
Summary
A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link | Exploit | |
cna@vuldb.com | https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4 | Patch | |
cna@vuldb.com | https://github.com/jasper-software/jasper/issues/401 | Exploit, Issue Tracking, Vendor Advisory | |
cna@vuldb.com | https://vuldb.com/?ctiid.319370 | Permissions Required, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?id.319370 | Third Party Advisory, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?submit.622409 | Exploit, Third Party Advisory, VDB Entry | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/jasper-software/jasper/issues/401 | Exploit, Issue Tracking, Vendor Advisory |
Impacted products
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-8836", "options": [ { "Exploitation": "poc" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-11T15:14:46.001573Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-12T13:44:11.473Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "references": [ { "tags": [ "exploit" ], "url": "https://github.com/jasper-software/jasper/issues/401" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "modules": [ "JPEG2000 Encoder" ], "product": "JasPer", "vendor": "n/a", "versions": [ { "status": "affected", "version": "4.2.0" }, { "status": "affected", "version": "4.2.1" }, { "status": "affected", "version": "4.2.2" }, { "status": "affected", "version": "4.2.3" }, { "status": "affected", "version": "4.2.4" }, { "status": "affected", "version": "4.2.5" } ] } ], "credits": [ { "lang": "en", "type": "reporter", "value": "nipc-cxd (VulDB User)" } ], "descriptions": [ { "lang": "en", "value": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue." }, { "lang": "de", "value": "Davon betroffen ist die Funktion jpc_floorlog2 der Datei src/libjasper/jpc/jpc_enc.c der Komponente JPEG2000 Encoder. Durch das Manipulieren mit unbekannten Daten kann eine reachable assertion-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \u00f6ffentlichen Verf\u00fcgung. Der Patch wird als 79185d32d7a444abae441935b20ae4676b3513d4 bezeichnet. Als bestm\u00f6gliche Massnahme wird Patching empfohlen." } ], "metrics": [ { "cvssV4_0": { "baseScore": 4.8, "baseSeverity": "MEDIUM", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P", "version": "4.0" } }, { "cvssV3_1": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.1" } }, { "cvssV3_0": { "baseScore": 3.3, "baseSeverity": "LOW", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C", "version": "3.0" } }, { "cvssV2_0": { "baseScore": 1.7, "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C", "version": "2.0" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-617", "description": "Reachable Assertion", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-11T07:32:08.430Z", "orgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "shortName": "VulDB" }, "references": [ { "name": "VDB-319370 | JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion", "tags": [ "vdb-entry", "technical-description" ], "url": "https://vuldb.com/?id.319370" }, { "name": "VDB-319370 | CTI Indicators (IOB, IOC, IOA)", "tags": [ "signature", "permissions-required" ], "url": "https://vuldb.com/?ctiid.319370" }, { "name": "Submit #622409 | JasPer The newest master \u0026\u0026 jasper-4.2.5 Assertion Failure", "tags": [ "third-party-advisory" ], "url": "https://vuldb.com/?submit.622409" }, { "tags": [ "issue-tracking" ], "url": "https://github.com/jasper-software/jasper/issues/401" }, { "tags": [ "exploit" ], "url": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link" }, { "tags": [ "patch" ], "url": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4" } ], "timeline": [ { "lang": "en", "time": "2025-08-10T00:00:00.000Z", "value": "Advisory disclosed" }, { "lang": "en", "time": "2025-08-10T02:00:00.000Z", "value": "VulDB entry created" }, { "lang": "en", "time": "2025-08-10T13:20:00.000Z", "value": "VulDB entry last update" } ], "title": "JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion" } }, "cveMetadata": { "assignerOrgId": "1af790b2-7ee1-4545-860a-a788eba489b5", "assignerShortName": "VulDB", "cveId": "CVE-2025-8836", "datePublished": "2025-08-11T07:32:08.430Z", "dateReserved": "2025-08-10T11:14:50.565Z", "dateUpdated": "2025-08-12T13:44:11.473Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-8836\",\"sourceIdentifier\":\"cna@vuldb.com\",\"published\":\"2025-08-11T08:15:26.700\",\"lastModified\":\"2025-09-16T18:59:52.123\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.\"},{\"lang\":\"es\",\"value\":\"Se detect\u00f3 una vulnerabilidad en JasPer hasta la versi\u00f3n 4.2.5. Este problema afecta a la funci\u00f3n jpc_floorlog2 del archivo src/libjasper/jpc/jpc_enc.c del componente JPEG2000 Encoder. La manipulaci\u00f3n genera una aserci\u00f3n accesible. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se identifica como 79185d32d7a444abae441935b20ae4676b3513d4. Se recomienda aplicar un parche para solucionar este problema.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X\",\"baseScore\":4.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"NONE\",\"vulnIntegrityImpact\":\"NONE\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"PROOF_OF_CONCEPT\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NOT_DEFINED\",\"Recovery\":\"NOT_DEFINED\",\"valueDensity\":\"NOT_DEFINED\",\"vulnerabilityResponseEffort\":\"NOT_DEFINED\",\"providerUrgency\":\"NOT_DEFINED\"}}],\"cvssMetricV31\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":3.3,\"baseSeverity\":\"LOW\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":1.8,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:S/C:N/I:N/A:P\",\"baseScore\":1.7,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"SINGLE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.1,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"cna@vuldb.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-617\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"4.2.5\",\"matchCriteriaId\":\"3FE39B51-8944-431F-B8E4-7D8783772137\"}]}]}],\"references\":[{\"url\":\"https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\"]},{\"url\":\"https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/jasper-software/jasper/issues/401\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]},{\"url\":\"https://vuldb.com/?ctiid.319370\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Permissions Required\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?id.319370\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://vuldb.com/?submit.622409\",\"source\":\"cna@vuldb.com\",\"tags\":[\"Exploit\",\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://github.com/jasper-software/jasper/issues/401\",\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"tags\":[\"Exploit\",\"Issue Tracking\",\"Vendor Advisory\"]}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-8836\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-08-11T15:14:46.001573Z\"}}}], \"references\": [{\"url\": \"https://github.com/jasper-software/jasper/issues/401\", \"tags\": [\"exploit\"]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-08-11T15:14:47.599Z\"}}], \"cna\": {\"title\": \"JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion\", \"credits\": [{\"lang\": \"en\", \"type\": \"reporter\", \"value\": \"nipc-cxd (VulDB User)\"}], \"metrics\": [{\"cvssV4_0\": {\"version\": \"4.0\", \"baseScore\": 4.8, \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P\"}}, {\"cvssV3_1\": {\"version\": \"3.1\", \"baseScore\": 3.3, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C\"}}, {\"cvssV3_0\": {\"version\": \"3.0\", \"baseScore\": 3.3, \"baseSeverity\": \"LOW\", \"vectorString\": \"CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C\"}}, {\"cvssV2_0\": {\"version\": \"2.0\", \"baseScore\": 1.7, \"vectorString\": \"AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:OF/RC:C\"}}], \"affected\": [{\"vendor\": \"n/a\", \"modules\": [\"JPEG2000 Encoder\"], \"product\": \"JasPer\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.2.0\"}, {\"status\": \"affected\", \"version\": \"4.2.1\"}, {\"status\": \"affected\", \"version\": \"4.2.2\"}, {\"status\": \"affected\", \"version\": \"4.2.3\"}, {\"status\": \"affected\", \"version\": \"4.2.4\"}, {\"status\": \"affected\", \"version\": \"4.2.5\"}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-08-10T00:00:00.000Z\", \"value\": \"Advisory disclosed\"}, {\"lang\": \"en\", \"time\": \"2025-08-10T02:00:00.000Z\", \"value\": \"VulDB entry created\"}, {\"lang\": \"en\", \"time\": \"2025-08-10T13:20:00.000Z\", \"value\": \"VulDB entry last update\"}], \"references\": [{\"url\": \"https://vuldb.com/?id.319370\", \"name\": \"VDB-319370 | JasPer JPEG2000 Encoder jpc_enc.c jpc_floorlog2 assertion\", \"tags\": [\"vdb-entry\", \"technical-description\"]}, {\"url\": \"https://vuldb.com/?ctiid.319370\", \"name\": \"VDB-319370 | CTI Indicators (IOB, IOC, IOA)\", \"tags\": [\"signature\", \"permissions-required\"]}, {\"url\": \"https://vuldb.com/?submit.622409\", \"name\": \"Submit #622409 | JasPer The newest master \u0026\u0026 jasper-4.2.5 Assertion Failure\", \"tags\": [\"third-party-advisory\"]}, {\"url\": \"https://github.com/jasper-software/jasper/issues/401\", \"tags\": [\"issue-tracking\"]}, {\"url\": \"https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link\", \"tags\": [\"exploit\"]}, {\"url\": \"https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4\", \"tags\": [\"patch\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.\"}, {\"lang\": \"de\", \"value\": \"Davon betroffen ist die Funktion jpc_floorlog2 der Datei src/libjasper/jpc/jpc_enc.c der Komponente JPEG2000 Encoder. Durch das Manipulieren mit unbekannten Daten kann eine reachable assertion-Schwachstelle ausgenutzt werden. Der Angriff muss lokal passieren. Der Exploit steht zur \\u00f6ffentlichen Verf\\u00fcgung. Der Patch wird als 79185d32d7a444abae441935b20ae4676b3513d4 bezeichnet. Als bestm\\u00f6gliche Massnahme wird Patching empfohlen.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-617\", \"description\": \"Reachable Assertion\"}]}], \"providerMetadata\": {\"orgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"shortName\": \"VulDB\", \"dateUpdated\": \"2025-08-11T07:32:08.430Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-8836\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-08-12T13:44:11.473Z\", \"dateReserved\": \"2025-08-10T11:14:50.565Z\", \"assignerOrgId\": \"1af790b2-7ee1-4545-860a-a788eba489b5\", \"datePublished\": \"2025-08-11T07:32:08.430Z\", \"assignerShortName\": \"VulDB\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
opensuse-su-2025:15447-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
jasper-4.2.8-2.1 on GA media
Notes
Title of the patch
jasper-4.2.8-2.1 on GA media
Description of the patch
These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15447
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "jasper-4.2.8-2.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the jasper-4.2.8-2.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15447", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15447-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8835 page", "url": "https://www.suse.com/security/cve/CVE-2025-8835/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8836 page", "url": "https://www.suse.com/security/cve/CVE-2025-8836/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8837 page", "url": "https://www.suse.com/security/cve/CVE-2025-8837/" } ], "title": "jasper-4.2.8-2.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15447-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.aarch64", "product": { "name": "jasper-4.2.8-2.1.aarch64", "product_id": "jasper-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.aarch64", "product": { "name": "libjasper-devel-4.2.8-2.1.aarch64", "product_id": "libjasper-devel-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.aarch64", "product": { "name": "libjasper7-4.2.8-2.1.aarch64", "product_id": "libjasper7-4.2.8-2.1.aarch64" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.aarch64", "product": { "name": "libjasper7-32bit-4.2.8-2.1.aarch64", "product_id": "libjasper7-32bit-4.2.8-2.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.ppc64le", "product": { "name": "jasper-4.2.8-2.1.ppc64le", "product_id": "jasper-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.ppc64le", "product": { "name": "libjasper-devel-4.2.8-2.1.ppc64le", "product_id": "libjasper-devel-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.ppc64le", "product": { "name": "libjasper7-4.2.8-2.1.ppc64le", "product_id": "libjasper7-4.2.8-2.1.ppc64le" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.ppc64le", "product": { "name": "libjasper7-32bit-4.2.8-2.1.ppc64le", "product_id": "libjasper7-32bit-4.2.8-2.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.s390x", "product": { "name": "jasper-4.2.8-2.1.s390x", "product_id": "jasper-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.s390x", "product": { "name": "libjasper-devel-4.2.8-2.1.s390x", "product_id": "libjasper-devel-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.s390x", "product": { "name": "libjasper7-4.2.8-2.1.s390x", "product_id": "libjasper7-4.2.8-2.1.s390x" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.s390x", "product": { "name": "libjasper7-32bit-4.2.8-2.1.s390x", "product_id": "libjasper7-32bit-4.2.8-2.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jasper-4.2.8-2.1.x86_64", "product": { "name": "jasper-4.2.8-2.1.x86_64", "product_id": "jasper-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper-devel-4.2.8-2.1.x86_64", "product": { "name": "libjasper-devel-4.2.8-2.1.x86_64", "product_id": "libjasper-devel-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper7-4.2.8-2.1.x86_64", "product": { "name": "libjasper7-4.2.8-2.1.x86_64", "product_id": "libjasper7-4.2.8-2.1.x86_64" } }, { "category": "product_version", "name": "libjasper7-32bit-4.2.8-2.1.x86_64", "product": { "name": "libjasper7-32bit-4.2.8-2.1.x86_64", "product_id": "libjasper7-32bit-4.2.8-2.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64" }, "product_reference": "jasper-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le" }, "product_reference": "jasper-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x" }, "product_reference": "jasper-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "jasper-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64" }, "product_reference": "jasper-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64" }, "product_reference": "libjasper-devel-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper-devel-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x" }, "product_reference": "libjasper-devel-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper-devel-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64" }, "product_reference": "libjasper-devel-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64" }, "product_reference": "libjasper7-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper7-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x" }, "product_reference": "libjasper7-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" }, "product_reference": "libjasper7-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper7-32bit-4.2.8-2.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64" }, "product_reference": "libjasper7-32bit-4.2.8-2.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-8835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8835" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8835", "url": "https://www.suse.com/security/cve/CVE-2025-8835" }, { "category": "external", "summary": "SUSE Bug 1247904 for CVE-2025-8835", "url": "https://bugzilla.suse.com/1247904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-8835" }, { "cve": "CVE-2025-8836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8836" } ], "notes": [ { "category": "general", "text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8836", "url": "https://www.suse.com/security/cve/CVE-2025-8836" }, { "category": "external", "summary": "SUSE Bug 1247902 for CVE-2025-8836", "url": "https://bugzilla.suse.com/1247902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "low" } ], "title": "CVE-2025-8836" }, { "cve": "CVE-2025-8837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8837" } ], "notes": [ { "category": "general", "text": "A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8837", "url": "https://www.suse.com/security/cve/CVE-2025-8837" }, { "category": "external", "summary": "SUSE Bug 1247901 for CVE-2025-8837", "url": "https://bugzilla.suse.com/1247901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:jasper-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:jasper-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:jasper-4.2.8-2.1.s390x", "openSUSE Tumbleweed:jasper-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper-devel-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-32bit-4.2.8-2.1.x86_64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.aarch64", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.ppc64le", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.s390x", "openSUSE Tumbleweed:libjasper7-4.2.8-2.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "moderate" } ], "title": "CVE-2025-8837" } ] }
opensuse-su-2025:15448-1
Vulnerability from csaf_opensuse
Published
2025-08-15 00:00
Modified
2025-08-15 00:00
Summary
lighttpd-1.4.80-1.1 on GA media
Notes
Title of the patch
lighttpd-1.4.80-1.1 on GA media
Description of the patch
These are all security issues fixed in the lighttpd-1.4.80-1.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2025-15448
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "lighttpd-1.4.80-1.1 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the lighttpd-1.4.80-1.1 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2025-15448", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15448-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8671 page", "url": "https://www.suse.com/security/cve/CVE-2025-8671/" } ], "title": "lighttpd-1.4.80-1.1 on GA media", "tracking": { "current_release_date": "2025-08-15T00:00:00Z", "generator": { "date": "2025-08-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2025:15448-1", "initial_release_date": "2025-08-15T00:00:00Z", "revision_history": [ { "date": "2025-08-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "lighttpd-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-1.4.80-1.1.aarch64", "product_id": "lighttpd-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_deflate-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_magnet-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_nss-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_nss-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_nss-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_openssl-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64" } }, { "category": "product_version", "name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64", "product": { "name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64", "product_id": "lighttpd-mod_webdav-1.4.80-1.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "lighttpd-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-1.4.80-1.1.ppc64le", "product_id": "lighttpd-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_nss-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le" } }, { "category": "product_version", "name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "product": { "name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "product_id": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "lighttpd-1.4.80-1.1.s390x", "product": { "name": "lighttpd-1.4.80-1.1.s390x", "product_id": "lighttpd-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_deflate-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_deflate-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_deflate-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_gnutls-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_magnet-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_magnet-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_magnet-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_nss-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_nss-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_nss-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_openssl-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_openssl-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_openssl-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x" } }, { "category": "product_version", "name": "lighttpd-mod_webdav-1.4.80-1.1.s390x", "product": { "name": "lighttpd-mod_webdav-1.4.80-1.1.s390x", "product_id": "lighttpd-mod_webdav-1.4.80-1.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "lighttpd-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-1.4.80-1.1.x86_64", "product_id": "lighttpd-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_deflate-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_magnet-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_nss-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_nss-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_nss-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_openssl-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64" } }, { "category": "product_version", "name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64", "product": { "name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64", "product_id": "lighttpd-mod_webdav-1.4.80-1.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "lighttpd-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_deflate-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_deflate-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_deflate-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_deflate-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_deflate-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_deflate-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_magnet-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_magnet-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_magnet-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_magnet-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_magnet-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_magnet-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_nss-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_nss-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_nss-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_nss-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_nss-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_nss-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_nss-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_nss-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_openssl-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_openssl-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_openssl-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_openssl-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_openssl-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_openssl-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_webdav-1.4.80-1.1.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64" }, "product_reference": "lighttpd-mod_webdav-1.4.80-1.1.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le" }, "product_reference": "lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_webdav-1.4.80-1.1.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x" }, "product_reference": "lighttpd-mod_webdav-1.4.80-1.1.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "lighttpd-mod_webdav-1.4.80-1.1.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64" }, "product_reference": "lighttpd-mod_webdav-1.4.80-1.1.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-8671", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8671" } ], "notes": [ { "category": "general", "text": "A mismatch caused by client-triggered server-sent stream resets between HTTP/2 specifications and the internal architectures of some HTTP/2 implementations may result in excessive server resource consumption leading to denial-of-service (DoS). By opening streams and then rapidly triggering the server to reset them-using malformed frames or flow control errors-an attacker can exploit incorrect stream accounting. Streams reset by the server are considered closed at the protocol level, even though backend processing continues. This allows a client to cause the server to handle an unbounded number of concurrent streams on a single connection. This CVE will be updated as affected product details are released.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8671", "url": "https://www.suse.com/security/cve/CVE-2025-8671" }, { "category": "external", "summary": "SUSE Bug 1243888 for CVE-2025-8671", "url": "https://bugzilla.suse.com/1243888" }, { "category": "external", "summary": "SUSE Bug 1243895 for CVE-2025-8671", "url": "https://bugzilla.suse.com/1243895" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.5, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_gssapi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_pam-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_authn_sasl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_deflate-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_gnutls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_magnet-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_maxminddb-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_mbedtls-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_nss-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_openssl-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_rrdtool-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_dbi-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_ldap-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_mysql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_vhostdb_pgsql-1.4.80-1.1.x86_64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.aarch64", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.ppc64le", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.s390x", "openSUSE Tumbleweed:lighttpd-mod_webdav-1.4.80-1.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-08-15T00:00:00Z", "details": "important" } ], "title": "CVE-2025-8671" } ] }
suse-su-2025:03219-1
Vulnerability from csaf_suse
Published
2025-09-15 09:19
Modified
2025-09-15 09:19
Summary
Security update for jasper
Notes
Title of the patch
Security update for jasper
Description of the patch
This update for jasper fixes the following issues:
- CVE-2025-8835: missing range check in the JPEG-2000 (JPC) Encoder leads to assertion failure and crash when
processing a malformed JPEG2000 image with an invalid `cblkwidth` parameter (bsc#1247904).
- CVE-2025-8836: out-of-bounds array indexing in function `jas_image_chclrspc` leads to crash when processing a
malformed image file with BMP output format and color space conversion (bsc#1247902).
- CVE-2025-8837: missing operations in cleanup code of the JPEG-2000 (JPC) Encoder leads to use-after-free when
processing malformed JPEG2000 images with certain debug levels enabled (bsc#1247901).
Patchnames
SUSE-2025-3219,SUSE-SLE-Module-Basesystem-15-SP6-2025-3219,SUSE-SLE-Module-Basesystem-15-SP7-2025-3219
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Security update for jasper", "title": "Title of the patch" }, { "category": "description", "text": "This update for jasper fixes the following issues:\n\n- CVE-2025-8835: missing range check in the JPEG-2000 (JPC) Encoder leads to assertion failure and crash when\n processing a malformed JPEG2000 image with an invalid `cblkwidth` parameter (bsc#1247904).\n- CVE-2025-8836: out-of-bounds array indexing in function `jas_image_chclrspc` leads to crash when processing a\n malformed image file with BMP output format and color space conversion (bsc#1247902).\n- CVE-2025-8837: missing operations in cleanup code of the JPEG-2000 (JPC) Encoder leads to use-after-free when\n processing malformed JPEG2000 images with certain debug levels enabled (bsc#1247901).\n", "title": "Description of the patch" }, { "category": "details", "text": "SUSE-2025-3219,SUSE-SLE-Module-Basesystem-15-SP6-2025-3219,SUSE-SLE-Module-Basesystem-15-SP7-2025-3219", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_03219-1.json" }, { "category": "self", "summary": "URL for SUSE-SU-2025:03219-1", "url": "https://www.suse.com/support/update/announcement/2025/suse-su-202503219-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-SU-2025:03219-1", "url": "https://lists.suse.com/pipermail/sle-updates/2025-September/041704.html" }, { "category": "self", "summary": "SUSE Bug 1247901", "url": "https://bugzilla.suse.com/1247901" }, { "category": "self", "summary": "SUSE Bug 1247902", "url": "https://bugzilla.suse.com/1247902" }, { "category": "self", "summary": "SUSE Bug 1247904", "url": "https://bugzilla.suse.com/1247904" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8835 page", "url": "https://www.suse.com/security/cve/CVE-2025-8835/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8836 page", "url": "https://www.suse.com/security/cve/CVE-2025-8836/" }, { "category": "self", "summary": "SUSE CVE CVE-2025-8837 page", "url": "https://www.suse.com/security/cve/CVE-2025-8837/" } ], "title": "Security update for jasper", "tracking": { "current_release_date": "2025-09-15T09:19:16Z", "generator": { "date": "2025-09-15T09:19:16Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-SU-2025:03219-1", "initial_release_date": "2025-09-15T09:19:16Z", "revision_history": [ { "date": "2025-09-15T09:19:16Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "jasper-2.0.14-150000.3.37.1.aarch64", "product": { "name": "jasper-2.0.14-150000.3.37.1.aarch64", "product_id": "jasper-2.0.14-150000.3.37.1.aarch64" } }, { "category": "product_version", "name": "libjasper-devel-2.0.14-150000.3.37.1.aarch64", "product": { "name": "libjasper-devel-2.0.14-150000.3.37.1.aarch64", "product_id": "libjasper-devel-2.0.14-150000.3.37.1.aarch64" } }, { "category": "product_version", "name": "libjasper4-2.0.14-150000.3.37.1.aarch64", "product": { "name": "libjasper4-2.0.14-150000.3.37.1.aarch64", "product_id": "libjasper4-2.0.14-150000.3.37.1.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "libjasper4-64bit-2.0.14-150000.3.37.1.aarch64_ilp32", "product": { "name": "libjasper4-64bit-2.0.14-150000.3.37.1.aarch64_ilp32", "product_id": "libjasper4-64bit-2.0.14-150000.3.37.1.aarch64_ilp32" } } ], "category": "architecture", "name": "aarch64_ilp32" }, { "branches": [ { "category": "product_version", "name": "jasper-2.0.14-150000.3.37.1.i586", "product": { "name": "jasper-2.0.14-150000.3.37.1.i586", "product_id": "jasper-2.0.14-150000.3.37.1.i586" } }, { "category": "product_version", "name": "libjasper-devel-2.0.14-150000.3.37.1.i586", "product": { "name": "libjasper-devel-2.0.14-150000.3.37.1.i586", "product_id": "libjasper-devel-2.0.14-150000.3.37.1.i586" } }, { "category": "product_version", "name": "libjasper4-2.0.14-150000.3.37.1.i586", "product": { "name": "libjasper4-2.0.14-150000.3.37.1.i586", "product_id": "libjasper4-2.0.14-150000.3.37.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "jasper-2.0.14-150000.3.37.1.ppc64le", "product": { "name": "jasper-2.0.14-150000.3.37.1.ppc64le", "product_id": "jasper-2.0.14-150000.3.37.1.ppc64le" } }, { "category": "product_version", "name": "libjasper-devel-2.0.14-150000.3.37.1.ppc64le", "product": { "name": "libjasper-devel-2.0.14-150000.3.37.1.ppc64le", "product_id": "libjasper-devel-2.0.14-150000.3.37.1.ppc64le" } }, { "category": "product_version", "name": "libjasper4-2.0.14-150000.3.37.1.ppc64le", "product": { "name": "libjasper4-2.0.14-150000.3.37.1.ppc64le", "product_id": "libjasper4-2.0.14-150000.3.37.1.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "jasper-2.0.14-150000.3.37.1.s390x", "product": { "name": "jasper-2.0.14-150000.3.37.1.s390x", "product_id": "jasper-2.0.14-150000.3.37.1.s390x" } }, { "category": "product_version", "name": "libjasper-devel-2.0.14-150000.3.37.1.s390x", "product": { "name": "libjasper-devel-2.0.14-150000.3.37.1.s390x", "product_id": "libjasper-devel-2.0.14-150000.3.37.1.s390x" } }, { "category": "product_version", "name": "libjasper4-2.0.14-150000.3.37.1.s390x", "product": { "name": "libjasper4-2.0.14-150000.3.37.1.s390x", "product_id": "libjasper4-2.0.14-150000.3.37.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "jasper-2.0.14-150000.3.37.1.x86_64", "product": { "name": "jasper-2.0.14-150000.3.37.1.x86_64", "product_id": "jasper-2.0.14-150000.3.37.1.x86_64" } }, { "category": "product_version", "name": "libjasper-devel-2.0.14-150000.3.37.1.x86_64", "product": { "name": "libjasper-devel-2.0.14-150000.3.37.1.x86_64", "product_id": "libjasper-devel-2.0.14-150000.3.37.1.x86_64" } }, { "category": "product_version", "name": "libjasper4-2.0.14-150000.3.37.1.x86_64", "product": { "name": "libjasper4-2.0.14-150000.3.37.1.x86_64", "product_id": "libjasper4-2.0.14-150000.3.37.1.x86_64" } }, { "category": "product_version", "name": "libjasper4-32bit-2.0.14-150000.3.37.1.x86_64", "product": { "name": "libjasper4-32bit-2.0.14-150000.3.37.1.x86_64", "product_id": "libjasper4-32bit-2.0.14-150000.3.37.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7", "product": { "name": "SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_identification_helper": { "cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.aarch64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.ppc64le", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7" }, { "category": "default_component_of", "full_product_name": { "name": "libjasper4-2.0.14-150000.3.37.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7", "product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" }, "product_reference": "libjasper4-2.0.14-150000.3.37.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7" } ] }, "vulnerabilities": [ { "cve": "CVE-2025-8835", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8835" } ], "notes": [ { "category": "general", "text": "A vulnerability was found in JasPer up to 4.2.5. Affected by this vulnerability is the function jas_image_chclrspc of the file src/libjasper/base/jas_image.c of the component Image Color Space Conversion Handler. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The identifier of the patch is bb7d62bd0a2a8e0e1fdb4d603f3305f955158c52. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8835", "url": "https://www.suse.com/security/cve/CVE-2025-8835" }, { "category": "external", "summary": "SUSE Bug 1247904 for CVE-2025-8835", "url": "https://bugzilla.suse.com/1247904" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 5.5, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-15T09:19:16Z", "details": "moderate" } ], "title": "CVE-2025-8835" }, { "cve": "CVE-2025-8836", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8836" } ], "notes": [ { "category": "general", "text": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8836", "url": "https://www.suse.com/security/cve/CVE-2025-8836" }, { "category": "external", "summary": "SUSE Bug 1247902 for CVE-2025-8836", "url": "https://bugzilla.suse.com/1247902" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 2.5, "baseSeverity": "LOW", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:N/A:L", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-15T09:19:16Z", "details": "low" } ], "title": "CVE-2025-8836" }, { "cve": "CVE-2025-8837", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2025-8837" } ], "notes": [ { "category": "general", "text": "A vulnerability was identified in JasPer up to 4.2.5. This affects the function jpc_dec_dump of the file src/libjasper/jpc/jpc_dec.c of the component JPEG2000 File Handler. The manipulation leads to use after free. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is named 8308060d3fbc1da10353ac8a95c8ea60eba9c25a. It is recommended to apply a patch to fix this issue.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2025-8837", "url": "https://www.suse.com/security/cve/CVE-2025-8837" }, { "category": "external", "summary": "SUSE Bug 1247901 for CVE-2025-8837", "url": "https://bugzilla.suse.com/1247901" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 6.6, "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP6:libjasper4-2.0.14-150000.3.37.1.x86_64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.aarch64", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.ppc64le", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.s390x", "SUSE Linux Enterprise Module for Basesystem 15 SP7:libjasper4-2.0.14-150000.3.37.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2025-09-15T09:19:16Z", "details": "moderate" } ], "title": "CVE-2025-8837" } ] }
ghsa-hvcg-67f3-52cf
Vulnerability from github
Published
2025-08-11 09:30
Modified
2025-08-11 09:30
Severity ?
VLAI Severity ?
Details
A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.
{ "affected": [], "aliases": [ "CVE-2025-8836" ], "database_specific": { "cwe_ids": [ "CWE-617" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2025-08-11T08:15:26Z", "severity": "MODERATE" }, "details": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.", "id": "GHSA-hvcg-67f3-52cf", "modified": "2025-08-11T09:30:37Z", "published": "2025-08-11T09:30:37Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2025-8836" }, { "type": "WEB", "url": "https://github.com/jasper-software/jasper/issues/401" }, { "type": "WEB", "url": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4" }, { "type": "WEB", "url": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link" }, { "type": "WEB", "url": "https://vuldb.com/?ctiid.319370" }, { "type": "WEB", "url": "https://vuldb.com/?id.319370" }, { "type": "WEB", "url": "https://vuldb.com/?submit.622409" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "type": "CVSS_V3" }, { "score": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "type": "CVSS_V4" } ] }
fkie_cve-2025-8836
Vulnerability from fkie_nvd
Published
2025-08-11 08:15
Modified
2025-09-16 18:59
Severity ?
Summary
A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue.
References
▼ | URL | Tags | |
---|---|---|---|
cna@vuldb.com | https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link | Exploit | |
cna@vuldb.com | https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4 | Patch | |
cna@vuldb.com | https://github.com/jasper-software/jasper/issues/401 | Exploit, Issue Tracking, Vendor Advisory | |
cna@vuldb.com | https://vuldb.com/?ctiid.319370 | Permissions Required, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?id.319370 | Third Party Advisory, VDB Entry | |
cna@vuldb.com | https://vuldb.com/?submit.622409 | Exploit, Third Party Advisory, VDB Entry | |
134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://github.com/jasper-software/jasper/issues/401 | Exploit, Issue Tracking, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
jasper_project | jasper | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:jasper_project:jasper:*:*:*:*:*:*:*:*", "matchCriteriaId": "3FE39B51-8944-431F-B8E4-7D8783772137", "versionEndIncluding": "4.2.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A vulnerability was determined in JasPer up to 4.2.5. Affected by this issue is the function jpc_floorlog2 of the file src/libjasper/jpc/jpc_enc.c of the component JPEG2000 Encoder. The manipulation leads to reachable assertion. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as 79185d32d7a444abae441935b20ae4676b3513d4. It is recommended to apply a patch to fix this issue." }, { "lang": "es", "value": "Se detect\u00f3 una vulnerabilidad en JasPer hasta la versi\u00f3n 4.2.5. Este problema afecta a la funci\u00f3n jpc_floorlog2 del archivo src/libjasper/jpc/jpc_enc.c del componente JPEG2000 Encoder. La manipulaci\u00f3n genera una aserci\u00f3n accesible. El ataque debe abordarse localmente. Se ha hecho p\u00fablico el exploit y puede que sea utilizado. El parche se identifica como 79185d32d7a444abae441935b20ae4676b3513d4. Se recomienda aplicar un parche para solucionar este problema." } ], "id": "CVE-2025-8836", "lastModified": "2025-09-16T18:59:52.123", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 1.7, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:S/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.1, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "cna@vuldb.com", "type": "Secondary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 3.3, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 1.4, "source": "cna@vuldb.com", "type": "Secondary" } ], "cvssMetricV40": [ { "cvssData": { "Automatable": "NOT_DEFINED", "Recovery": "NOT_DEFINED", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "availabilityRequirement": "NOT_DEFINED", "baseScore": 4.8, "baseSeverity": "MEDIUM", "confidentialityRequirement": "NOT_DEFINED", "exploitMaturity": "PROOF_OF_CONCEPT", "integrityRequirement": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubAvailabilityImpact": "NOT_DEFINED", "modifiedSubConfidentialityImpact": "NOT_DEFINED", "modifiedSubIntegrityImpact": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnAvailabilityImpact": "NOT_DEFINED", "modifiedVulnConfidentialityImpact": "NOT_DEFINED", "modifiedVulnIntegrityImpact": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "NOT_DEFINED", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "NOT_DEFINED", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "NOT_DEFINED" }, "source": "cna@vuldb.com", "type": "Secondary" } ] }, "published": "2025-08-11T08:15:26.700", "references": [ { "source": "cna@vuldb.com", "tags": [ "Exploit" ], "url": "https://drive.google.com/file/d/1pPgndhHh2z0lk99Wt31W-XIW3XWt8FB3/view?usp=drive_link" }, { "source": "cna@vuldb.com", "tags": [ "Patch" ], "url": "https://github.com/jasper-software/jasper/commit/79185d32d7a444abae441935b20ae4676b3513d4" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/401" }, { "source": "cna@vuldb.com", "tags": [ "Permissions Required", "VDB Entry" ], "url": "https://vuldb.com/?ctiid.319370" }, { "source": "cna@vuldb.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?id.319370" }, { "source": "cna@vuldb.com", "tags": [ "Exploit", "Third Party Advisory", "VDB Entry" ], "url": "https://vuldb.com/?submit.622409" }, { "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "tags": [ "Exploit", "Issue Tracking", "Vendor Advisory" ], "url": "https://github.com/jasper-software/jasper/issues/401" } ], "sourceIdentifier": "cna@vuldb.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-617" } ], "source": "cna@vuldb.com", "type": "Secondary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…