Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-30775 (GCVE-0-2023-30775)
Vulnerability from cvelistv5 – Published: 2023-05-19 00:00 – Updated: 2025-01-21 17:30{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T14:37:15.317Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"tags": [
"x_transferred"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"tags": [
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2023-30775",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-21T17:29:52.315626Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-787",
"description": "CWE-787 Out-of-bounds Write",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-21T17:30:59.637Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "libtiff",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "4.0"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-119",
"description": "CWE-119",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-03T00:00:00.000Z",
"orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"shortName": "redhat"
},
"references": [
{
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
"assignerShortName": "redhat",
"cveId": "CVE-2023-30775",
"datePublished": "2023-05-19T00:00:00.000Z",
"dateReserved": "2023-04-17T00:00:00.000Z",
"dateUpdated": "2025-01-21T17:30:59.637Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2023-30775\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2023-05-19T15:15:08.980\",\"lastModified\":\"2025-01-21T18:15:13.483\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":5.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":3.6}]},\"weaknesses\":[{\"source\":\"secalert@redhat.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libtiff:libtiff:4.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D49C1A38-70B8-4172-9FCD-F9E8848565C8\"}]}]}],\"references\":[{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-30775\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2187141\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/464\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230703-0002/\",\"source\":\"secalert@redhat.com\"},{\"url\":\"https://access.redhat.com/security/cve/CVE-2023-30775\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=2187141\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Third Party Advisory\"]},{\"url\":\"https://gitlab.com/libtiff/libtiff/-/issues/464\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20230703-0002/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://gitlab.com/libtiff/libtiff/-/issues/464\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-30775\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2187141\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230703-0002/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T14:37:15.317Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.5, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-30775\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-21T17:29:52.315626Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-21T17:30:33.463Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"libtiff\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\"}]}], \"references\": [{\"url\": \"https://gitlab.com/libtiff/libtiff/-/issues/464\"}, {\"url\": \"https://access.redhat.com/security/cve/CVE-2023-30775\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=2187141\"}, {\"url\": \"https://security.netapp.com/advisory/ntap-20230703-0002/\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-119\", \"description\": \"CWE-119\"}]}], \"providerMetadata\": {\"orgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"shortName\": \"redhat\", \"dateUpdated\": \"2023-07-03T00:00:00\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-30775\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-01-21T17:30:59.637Z\", \"dateReserved\": \"2023-04-17T00:00:00\", \"assignerOrgId\": \"53f830b8-0a3f-465b-8143-3b8a9948e749\", \"datePublished\": \"2023-05-19T00:00:00\", \"assignerShortName\": \"redhat\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2024-AVI-1103
Vulnerability from certfr_avis - Published: 2024-12-20 - Updated: 2024-12-20
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Cognos Analytics | Cognos Analytics versions 12.0.x antérieures à 12.0.4 | ||
| IBM | Sterling | Sterling External Authentication Server versions 6.1.0.x antérieures à 6.1.0.2 ifix 01 | ||
| IBM | QRadar SIEM | Security QRadar Log Management AQL Plugin versions antérieures à 1.1.0 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.0.x antérieures à 6.0.3.1 (fixpack) GA | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.4 FP5 | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.1.x antérieures à 6.1.0.1 (fixpack) GA | ||
| IBM | Sterling | Sterling Secure Proxy versions 6.2.x antérieures à 6.2.0.0 ifix 01 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct Web Services versions 6.3.x antérieures à 6.3.0.11_ifix001 |
| Title | Publication Time | Tags | ||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Cognos Analytics versions 12.0.x ant\u00e9rieures \u00e0 12.0.4",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling External Authentication Server versions 6.1.0.x ant\u00e9rieures \u00e0 6.1.0.2 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": " Security QRadar Log Management AQL Plugin versions ant\u00e9rieures \u00e0 1.1.0",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.0.x ant\u00e9rieures \u00e0 6.0.3.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.4 FP5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.1.x ant\u00e9rieures \u00e0 6.1.0.1 (fixpack) GA",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Secure Proxy versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.0 ifix 01",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct Web Services versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.11_ifix001",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2023-41334",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41334"
},
{
"name": "CVE-2023-37536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37536"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2024-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22871"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2024-36138",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36138"
},
{
"name": "CVE-2018-14042",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14042"
},
{
"name": "CVE-2024-29041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29041"
},
{
"name": "CVE-2021-45960",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45960"
},
{
"name": "CVE-2024-22020",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22020"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2023-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38264"
},
{
"name": "CVE-2024-22201",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22201"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2018-15209",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15209"
},
{
"name": "CVE-2024-28849",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28849"
},
{
"name": "CVE-2018-17100",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17100"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2022-34266",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34266"
},
{
"name": "CVE-2020-35521",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35521"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2023-50386",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50386"
},
{
"name": "CVE-2024-4068",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4068"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2024-23944",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23944"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2024-39008",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39008"
},
{
"name": "CVE-2018-14040",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14040"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2024-25638",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25638"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2019-6128",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6128"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2022-22823",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22823"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2024-45082",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45082"
},
{
"name": "CVE-2023-50782",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50782"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2022-2867",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2867"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2023-32067",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32067"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2019-11358",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11358"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2023-4759",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4759"
},
{
"name": "CVE-2017-11613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11613"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2024-41752",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-41752"
},
{
"name": "CVE-2023-50447",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50447"
},
{
"name": "CVE-2018-18508",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18508"
},
{
"name": "CVE-2024-29857",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29857"
},
{
"name": "CVE-2024-34447",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34447"
},
{
"name": "CVE-2024-33883",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33883"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2024-29025",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29025"
},
{
"name": "CVE-2022-22844",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22844"
},
{
"name": "CVE-2014-1544",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1544"
},
{
"name": "CVE-2023-4421",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4421"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2024-45590",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45590"
},
{
"name": "CVE-2024-43796",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-43796"
},
{
"name": "CVE-2023-50298",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50298"
},
{
"name": "CVE-2024-25629",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25629"
},
{
"name": "CVE-2024-26308",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26308"
},
{
"name": "CVE-2023-50292",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50292"
},
{
"name": "CVE-2018-20676",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20676"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2024-4067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4067"
},
{
"name": "CVE-2024-30172",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30172"
},
{
"name": "CVE-2021-43138",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43138"
},
{
"name": "CVE-2020-25648",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25648"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2022-21699",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21699"
},
{
"name": "CVE-2024-28176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28176"
},
{
"name": "CVE-2019-7317",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7317"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2019-17007",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17007"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2023-51074",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-51074"
},
{
"name": "CVE-2022-23852",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23852"
},
{
"name": "CVE-2022-22825",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22825"
},
{
"name": "CVE-2023-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38289"
},
{
"name": "CVE-2018-20677",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20677"
},
{
"name": "CVE-2010-1205",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1205"
},
{
"name": "CVE-2020-23064",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-23064"
},
{
"name": "CVE-2024-22195",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22195"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2015-7182",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7182"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2018-16335",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16335"
},
{
"name": "CVE-2024-21011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21011"
},
{
"name": "CVE-2024-29131",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29131"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2020-19144",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19144"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2024-27983",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27983"
},
{
"name": "CVE-2017-12627",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12627"
},
{
"name": "CVE-2018-17101",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17101"
},
{
"name": "CVE-2023-50291",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50291"
},
{
"name": "CVE-2014-1568",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1568"
},
{
"name": "CVE-2020-26261",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-26261"
},
{
"name": "CVE-2023-24816",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24816"
},
{
"name": "CVE-2024-45296",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45296"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2019-17546",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17546"
},
{
"name": "CVE-2022-2869",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2869"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2024-27982",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27982"
},
{
"name": "CVE-2024-25710",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25710"
},
{
"name": "CVE-2020-15110",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15110"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2024-37372",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37372"
},
{
"name": "CVE-2021-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38153"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2024-29133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29133"
},
{
"name": "CVE-2017-18869",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18869"
},
{
"name": "CVE-2022-0562",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0562"
},
{
"name": "CVE-2023-38325",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38325"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2022-0891",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0891"
},
{
"name": "CVE-2018-7456",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7456"
},
{
"name": "CVE-2023-38288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38288"
},
{
"name": "CVE-2024-21094",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21094"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2023-6237",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6237"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2017-18013",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18013"
},
{
"name": "CVE-2023-25194",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25194"
},
{
"name": "CVE-2023-6129",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6129"
},
{
"name": "CVE-2016-1938",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1938"
},
{
"name": "CVE-2017-11698",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11698"
},
{
"name": "CVE-2022-22827",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22827"
},
{
"name": "CVE-2024-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38337"
},
{
"name": "CVE-2018-12384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12384"
},
{
"name": "CVE-2018-12404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12404"
},
{
"name": "CVE-2019-14973",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14973"
},
{
"name": "CVE-2020-36191",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36191"
},
{
"name": "CVE-2024-22018",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22018"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2018-14041",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14041"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2024-37890",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37890"
},
{
"name": "CVE-2020-19131",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19131"
},
{
"name": "CVE-2015-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7575"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2020-11022",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11022"
},
{
"name": "CVE-2018-5784",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5784"
},
{
"name": "CVE-2018-17000",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-17000"
},
{
"name": "CVE-2024-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28863"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2020-35523",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35523"
},
{
"name": "CVE-2016-10735",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10735"
},
{
"name": "CVE-2024-39338",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39338"
},
{
"name": "CVE-2022-34749",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34749"
},
{
"name": "CVE-2024-30171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30171"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2022-0908",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0908"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-36114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36114"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2024-34102",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34102"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2021-32862",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32862"
},
{
"name": "CVE-2022-22826",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22826"
},
{
"name": "CVE-2024-4367",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4367"
},
{
"name": "CVE-2024-25016",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25016"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-29896",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-29896"
},
{
"name": "CVE-2015-7181",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7181"
},
{
"name": "CVE-2020-18768",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-18768"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2022-2868",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2868"
},
{
"name": "CVE-2017-5461",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5461"
},
{
"name": "CVE-2014-1569",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1569"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2023-31130",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31130"
},
{
"name": "CVE-2024-21085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21085"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2017-11695",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11695"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2022-22824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22824"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2017-11697",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11697"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2024-27980",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27980"
},
{
"name": "CVE-2023-5678",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5678"
},
{
"name": "CVE-2024-51504",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51504"
},
{
"name": "CVE-2018-19210",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19210"
},
{
"name": "CVE-2013-2099",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2099"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2019-10255",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10255"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2020-35524",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35524"
},
{
"name": "CVE-2019-8331",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8331"
},
{
"name": "CVE-2024-36137",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36137"
},
{
"name": "CVE-2020-35522",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-35522"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2017-11696",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11696"
},
{
"name": "CVE-2022-0561",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0561"
}
],
"initial_release_date": "2024-12-20T00:00:00",
"last_revision_date": "2024-12-20T00:00:00",
"links": [],
"reference": "CERTFR-2024-AVI-1103",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-12-20T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177142",
"url": "https://www.ibm.com/support/pages/node/7177142"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7177223",
"url": "https://www.ibm.com/support/pages/node/7177223"
},
{
"published_at": "2024-12-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179044",
"url": "https://www.ibm.com/support/pages/node/7179044"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179156",
"url": "https://www.ibm.com/support/pages/node/7179156"
},
{
"published_at": "2024-12-17",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7179166",
"url": "https://www.ibm.com/support/pages/node/7179166"
},
{
"published_at": "2024-12-13",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7178835",
"url": "https://www.ibm.com/support/pages/node/7178835"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
GHSA-JQMX-W3FP-9J6J
Vulnerability from github – Published: 2023-05-19 15:30 – Updated: 2024-04-04 04:15A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.
{
"affected": [],
"aliases": [
"CVE-2023-30775"
],
"database_specific": {
"cwe_ids": [
"CWE-119",
"CWE-787"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2023-05-19T15:15:08Z",
"severity": "MODERATE"
},
"details": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
"id": "GHSA-jqmx-w3fp-9j6j",
"modified": "2024-04-04T04:15:17Z",
"published": "2023-05-19T15:30:20Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
},
{
"type": "WEB",
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"type": "WEB",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"type": "WEB",
"url": "https://security.netapp.com/advisory/ntap-20230703-0002"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
GSD-2023-30775
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-30775",
"id": "GSD-2023-30775"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-30775"
],
"details": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
"id": "GSD-2023-30775",
"modified": "2023-12-13T01:20:52.652322Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-30775",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "libtiff",
"version": {
"version_data": [
{
"version_value": "4.0"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/libtiff/libtiff/-/issues/464",
"refsource": "MISC",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2023-30775",
"refsource": "MISC",
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141",
"refsource": "MISC",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230703-0002/",
"refsource": "CONFIRM",
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
}
]
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "=4.4.0",
"affected_versions": "Version 4.4.0",
"cvss_v3": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"cwe_ids": [
"CWE-1035",
"CWE-787",
"CWE-937"
],
"date": "2023-07-03",
"description": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
"fixed_versions": [
"4.5.0"
],
"identifier": "CVE-2023-30775",
"identifiers": [
"CVE-2023-30775"
],
"not_impacted": "All versions before 4.4.0, all versions after 4.4.0",
"package_slug": "conan/libtiff",
"pubdate": "2023-05-19",
"solution": "Upgrade to version 4.5.0 or above.",
"title": "Out-of-bounds Write",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
"https://gitlab.com/libtiff/libtiff/-/issues/464",
"https://bugzilla.redhat.com/show_bug.cgi?id=2187141",
"https://access.redhat.com/security/cve/CVE-2023-30775"
],
"uuid": "9fa73388-22de-48b4-88fb-2e29acbfe15d"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:libtiff:libtiff:4.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "secalert@redhat.com",
"ID": "CVE-2023-30775"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://gitlab.com/libtiff/libtiff/-/issues/464",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"name": "https://access.redhat.com/security/cve/CVE-2023-30775",
"refsource": "MISC",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"name": "https://security.netapp.com/advisory/ntap-20230703-0002/",
"refsource": "CONFIRM",
"tags": [],
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6
}
},
"lastModifiedDate": "2023-07-03T16:15Z",
"publishedDate": "2023-05-19T15:15Z"
}
}
}
RHSA-2023:2340
Vulnerability from csaf_redhat - Published: 2023-05-09 10:02 - Updated: 2026-01-27 15:28Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "An update for libtiff is now available for Red Hat Enterprise Linux 9.\n\nRed Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section.",
"title": "Topic"
},
{
"category": "general",
"text": "The libtiff packages contain a library of functions for manipulating Tagged Image File Format (TIFF) files.\n\nSecurity Fix(es):\n\n* libtiff: heap Buffer overflows in tiffcrop.c (CVE-2022-3570)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix (CVE-2022-3597)\n\n* libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c (CVE-2022-3598)\n\n* libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c (CVE-2022-3599)\n\n* libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c (CVE-2022-3626)\n\n* libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c (CVE-2022-3627)\n\n* libtiff: integer overflow in function TIFFReadRGBATileExt of the file (CVE-2022-3970)\n\n* libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c (CVE-2022-4645)\n\n* libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value (CVE-2023-30774)\n\n* libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c (CVE-2023-30775)\n\nFor more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 9.2 Release Notes linked from the References section.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2023:2340",
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index",
"url": "https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/9/html/9.2_release_notes/index"
},
{
"category": "external",
"summary": "2142734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
},
{
"category": "external",
"summary": "2142736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
},
{
"category": "external",
"summary": "2142738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
},
{
"category": "external",
"summary": "2142740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
},
{
"category": "external",
"summary": "2142741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
},
{
"category": "external",
"summary": "2142742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
},
{
"category": "external",
"summary": "2148918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
},
{
"category": "external",
"summary": "2176220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
},
{
"category": "external",
"summary": "2187139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
},
{
"category": "external",
"summary": "2187141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2023/rhsa-2023_2340.json"
}
],
"title": "Red Hat Security Advisory: libtiff security update",
"tracking": {
"current_release_date": "2026-01-27T15:28:49+00:00",
"generator": {
"date": "2026-01-27T15:28:49+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.16"
}
},
"id": "RHSA-2023:2340",
"initial_release_date": "2023-05-09T10:02:52+00:00",
"revision_history": [
{
"date": "2023-05-09T10:02:52+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2023-05-09T10:02:52+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2026-01-27T15:28:49+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::appstream"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product": {
"name": "Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA",
"product_identification_helper": {
"cpe": "cpe:/a:redhat:enterprise_linux:9::crb"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.src",
"product": {
"name": "libtiff-0:4.4.0-7.el9.src",
"product_id": "libtiff-0:4.4.0-7.el9.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=src"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=aarch64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product_id": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=aarch64"
}
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=ppc64le"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product_id": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=ppc64le"
}
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-0:4.4.0-7.el9.i686",
"product_id": "libtiff-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686",
"product_id": "libtiff-devel-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=i686"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=i686"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=x86_64"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product_id": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=x86_64"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "libtiff-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-devel-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-devel@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debugsource@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-debuginfo@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools-debuginfo@4.4.0-7.el9?arch=s390x"
}
}
},
{
"category": "product_version",
"name": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product_id": "libtiff-tools-0:4.4.0-7.el9.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/libtiff-tools@4.4.0-7.el9?arch=s390x"
}
}
}
],
"category": "architecture",
"name": "s390x"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
},
"product_reference": "libtiff-0:4.4.0-7.el9.src",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux AppStream (v. 9)",
"product_id": "AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "AppStream-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.src as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src"
},
"product_reference": "libtiff-0:4.4.0-7.el9.src",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-debugsource-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-devel-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-devel-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"relates_to_product_reference": "CRB-9.2.0.GA"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64 as a component of Red Hat Enterprise Linux CRB (v. 9)",
"product_id": "CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
},
"product_reference": "libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"relates_to_product_reference": "CRB-9.2.0.GA"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2022-3570",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142734"
}
],
"notes": [
{
"category": "description",
"text": "A heap-based buffer overflow flaw was found in Libtiff\u0027s tiffcrop utility. This issue occurs during the conversion of a TIFF image file, allowing an attacker to pass a crafted TIFF image file to tiffcrop utility, which causes an out-of-bound access resulting an application crash, eventually leading to a denial of service.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap Buffer overflows in tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3570"
},
{
"category": "external",
"summary": "RHBZ#2142734",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142734"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3570"
}
],
"release_date": "2022-02-24T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap Buffer overflows in tiffcrop.c"
},
{
"cve": "CVE-2022-3597",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142736"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3597"
},
{
"category": "external",
"summary": "RHBZ#2142736",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142736"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3597"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix"
},
{
"cve": "CVE-2022-3598",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142738"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the extractContigSamplesShifted24bits function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3598"
},
{
"category": "external",
"summary": "RHBZ#2142738",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142738"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3598"
}
],
"release_date": "2022-06-13T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c"
},
{
"cve": "CVE-2022-3599",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142740"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds read flaw was found in the writeSingleSection function in tools/tiffcrop.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3599"
},
{
"category": "external",
"summary": "RHBZ#2142740",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142740"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3599"
}
],
"release_date": "2022-02-25T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds read in writeSingleSection in tools/tiffcrop.c"
},
{
"cve": "CVE-2022-3626",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142741"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemset function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3626"
},
{
"category": "external",
"summary": "RHBZ#2142741",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142741"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3626"
}
],
"release_date": "2022-05-22T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c"
},
{
"cve": "CVE-2022-3627",
"discovery_date": "2022-10-23T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2142742"
}
],
"notes": [
{
"category": "description",
"text": "An out-of-bounds write flaw was found in the _TIFFmemcpy function in libtiff/tif_unix.c in the libtiff package. By persuading a victim to open a specially-crafted TIFF image file, a remote attacker could cause a denial of service condition.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3627"
},
{
"category": "external",
"summary": "RHBZ#2142742",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2142742"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3627"
}
],
"release_date": "2022-03-21T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c"
},
{
"cve": "CVE-2022-3970",
"cwe": {
"id": "CWE-680",
"name": "Integer Overflow to Buffer Overflow"
},
"discovery_date": "2022-11-16T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2148918"
}
],
"notes": [
{
"category": "description",
"text": "An integer overflow flaw was found in LibTIFF. This issue exists in the TIFFReadRGBATileExt function of the libtiff/tif_getimage.c file, and may lead to a buffer overflow.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "Red Hat Product security rated this issue having Moderate security impact as the exploitation of this issue will most likely to cause a denial of service attack. The score is based on the worst case scenario that an attacker might use the integer overflow to trigger other vulnerabilities such as buffer overflow, that could result in more adverse effects.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-3970"
},
{
"category": "external",
"summary": "RHBZ#2148918",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2148918"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-3970"
}
],
"release_date": "2022-11-08T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: integer overflow in function TIFFReadRGBATileExt of the file"
},
{
"cve": "CVE-2022-4645",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"discovery_date": "2023-03-03T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2176220"
}
],
"notes": [
{
"category": "description",
"text": "A flaw was found in tiffcp, a program distributed by the libtiff package. A specially crafted tiff file can lead to an out-of-bounds read in the tiffcp function in tools/tiffcp.c, resulting in a denial of service and limited information disclosure.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "other",
"text": "libtiff is a general purpose library to manipulate TIFF images. The library itself is not used directly, it\u0027s used via another application linked with the library, which means this issue can only be triggered by an application processing untrusted images. Therefore, if there is no way an attacker can provide a crafted image to an application, it\u0027s likely not possible to exploit this CVE.",
"title": "Statement"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2022-4645"
},
{
"category": "external",
"summary": "RHBZ#2176220",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2176220"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2022-4645"
}
],
"release_date": "2023-03-01T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: out-of-bounds read in tiffcp in tools/tiffcp.c"
},
{
"cve": "CVE-2023-30086",
"cwe": {
"id": "CWE-119",
"name": "Improper Restriction of Operations within the Bounds of a Memory Buffer"
},
"discovery_date": "2023-05-15T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2203650"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This flaw causes a buffer overflow in libtiff that allows a local attacker to cause a denial of service via the tiffcp function in tiffcp.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30086"
},
{
"category": "external",
"summary": "RHBZ#2203650",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2203650"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30086"
}
],
"release_date": "2023-05-10T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap buffer overflow in tiffcp() at tiffcp.c"
},
{
"cve": "CVE-2023-30774",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187139"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This flaw causes a heap buffer overflow issue via the TIFFTAG_INKNAMES and TIFFTAG_NUMBEROFINKS values.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30774"
},
{
"category": "external",
"summary": "RHBZ#2187139",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30774"
}
],
"release_date": "2023-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: heap buffer overflow issues related to TIFFTAG_INKNAMES and related TIFFTAG_NUMBEROFINKS value"
},
{
"cve": "CVE-2023-30775",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"discovery_date": "2023-04-17T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "2187141"
}
],
"notes": [
{
"category": "description",
"text": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"category": "external",
"summary": "RHBZ#2187141",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-30775"
}
],
"release_date": "2023-04-17T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2023-05-09T10:02:52+00:00",
"details": "For details on how to apply this update, which includes the changes described in this advisory, refer to:\n\nhttps://access.redhat.com/articles/11258\n\nAll running applications linked against libtiff must be restarted for this update to take effect.",
"product_ids": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"AppStream-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"AppStream-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.src",
"CRB-9.2.0.GA:libtiff-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debuginfo-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-debugsource-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-devel-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-0:4.4.0-7.el9.x86_64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.aarch64",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.i686",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.ppc64le",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.s390x",
"CRB-9.2.0.GA:libtiff-tools-debuginfo-0:4.4.0-7.el9.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "libtiff: Heap buffer overflow in extractContigSamples32bits, tiffcrop.c"
}
]
}
WID-SEC-W-2023-0979
Vulnerability from csaf_certbund - Published: 2023-04-16 22:00 - Updated: 2023-10-08 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "libTIFF ist ein Softwarepaket f\u00fcr die Verarbeitung von Bilddateien in Tag Image File Format (TIFF).",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libTIFF ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- UNIX\n- Linux",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-0979 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-0979.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-0979 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0979"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS-2023-1847 vom 2023-10-06",
"url": "https://alas.aws.amazon.com/ALAS-2023-1847.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2274 vom 2023-10-06",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2274.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2023:2340 vom 2023-05-09",
"url": "https://access.redhat.com/errata/RHSA-2023:2340"
},
{
"category": "external",
"summary": "PoC auf GitLab",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"category": "external",
"summary": "PoC auf GitLab",
"url": "https://gitlab.com/libtiff/libtiff/-/issues/463"
},
{
"category": "external",
"summary": "RedHat Customer Portal",
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"category": "external",
"summary": "RedHat Customer Portal",
"url": "https://access.redhat.com/security/cve/CVE-2023-30774"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-04-16",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"category": "external",
"summary": "RedHat Bugzilla vom 2023-04-16",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187139"
}
],
"source_lang": "en-US",
"title": "libTIFF: Mehrere Schwachstellen erm\u00f6glichen Denial of Service",
"tracking": {
"current_release_date": "2023-10-08T22:00:00.000+00:00",
"generator": {
"date": "2024-08-15T17:48:59.952+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.5"
}
},
"id": "WID-SEC-W-2023-0979",
"initial_release_date": "2023-04-16T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-04-16T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-05-09T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2023-10-05T22:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2023-10-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Amazon aufgenommen"
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Open Source libTIFF",
"product": {
"name": "Open Source libTIFF",
"product_id": "T001217",
"product_identification_helper": {
"cpe": "cpe:/a:libtiff:libtiff:-"
}
}
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-30775",
"notes": [
{
"category": "description",
"text": "In libTIFF existieren mehrere Schwachstellen. In extractContigSamples32bits und TIFFTAG_INKNAMES und TIFFTAG_NUMBEROFINKS Werten kommt es unter bestimmten Umst\u00e4nden zu einem Heap-Puffer\u00fcberlauf. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T001217",
"67646",
"398363"
]
},
"release_date": "2023-04-16T22:00:00.000+00:00",
"title": "CVE-2023-30775"
},
{
"cve": "CVE-2023-30774",
"notes": [
{
"category": "description",
"text": "In libTIFF existieren mehrere Schwachstellen. In extractContigSamples32bits und TIFFTAG_INKNAMES und TIFFTAG_NUMBEROFINKS Werten kommt es unter bestimmten Umst\u00e4nden zu einem Heap-Puffer\u00fcberlauf. Ein Angreifer kann diese Schwachstelle ausnutzen, um einen Denial of Service zu verursachen. Zur erfolgreichen Ausnutzung ist eine Benutzeraktion erforderlich."
}
],
"product_status": {
"known_affected": [
"T001217",
"67646",
"398363"
]
},
"release_date": "2023-04-16T22:00:00.000+00:00",
"title": "CVE-2023-30774"
}
]
}
WID-SEC-W-2023-2031
Vulnerability from csaf_certbund - Published: 2023-08-09 22:00 - Updated: 2025-10-19 22:00Notes
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "FreeFlow-Druckserver ist eine Druckserveranwendung f\u00fcr Xerox-Produktionsdrucker, die Flexibilit\u00e4t, umfangreiche Workflow-Optionen und eine Farbverwaltung bietet.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Xerox FreeFlow Print Server ausnutzen, um die Vertraulichkeit, Verf\u00fcgbarkeit und Integrit\u00e4t des Systems zu gef\u00e4hrden.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2023-2031 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2023/wid-sec-w-2023-2031.json"
},
{
"category": "self",
"summary": "WID-SEC-2023-2031 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-2031"
},
{
"category": "external",
"summary": "Xerox Security Bulletin vom 2023-08-09",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-011_FFPSv7-S11_MediaInstall_Aug2023.pdf"
},
{
"category": "external",
"summary": "Xerox Security Bulletin vom 2023-08-09",
"url": "https://security.business.xerox.com/wp-content/uploads/2023/08/cert_XRX23-012_FFPSv2_Win10_SecurityBulletin_Aug2023.pdf"
},
{
"category": "external",
"summary": "XEROX Security Advisory XRX23-013 vom 2023-08-24",
"url": "https://securitydocs.business.xerox.com/wp-content/uploads/2023/08/Xerox-Security-Bulletin-XRX23-013-Xerox%C2%AE-FreeFlow%C2%AE-Print-Server-v9.pdf"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2023-2331 vom 2023-11-02",
"url": "https://alas.aws.amazon.com/AL2/ALAS-2023-2331.html"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202408-17 vom 2024-08-09",
"url": "https://security.gentoo.org/glsa/202408-17"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-D2D3A5FA79 vom 2025-10-18",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-d2d3a5fa79"
}
],
"source_lang": "en-US",
"title": "Xerox FreeFlow Print Server: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-10-19T22:00:00.000+00:00",
"generator": {
"date": "2025-10-20T08:43:33.952+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.4.0"
}
},
"id": "WID-SEC-W-2023-2031",
"initial_release_date": "2023-08-09T22:00:00.000+00:00",
"revision_history": [
{
"date": "2023-08-09T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2023-08-24T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von XEROX aufgenommen"
},
{
"date": "2023-11-02T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2024-08-08T22:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-10-19T22:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Fedora aufgenommen"
}
],
"status": "final",
"version": "5"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "v2",
"product": {
"name": "Xerox FreeFlow Print Server v2",
"product_id": "T014888",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v2"
}
}
},
{
"category": "product_version",
"name": "v9",
"product": {
"name": "Xerox FreeFlow Print Server v9",
"product_id": "T015632",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v9"
}
}
},
{
"category": "product_version",
"name": "v7 for Solaris",
"product": {
"name": "Xerox FreeFlow Print Server v7 for Solaris",
"product_id": "T029230",
"product_identification_helper": {
"cpe": "cpe:/a:xerox:freeflow_print_server:v7_for_solaris"
}
}
}
],
"category": "product_name",
"name": "FreeFlow Print Server"
}
],
"category": "vendor",
"name": "Xerox"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2004-0687",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2004-0687"
},
{
"cve": "CVE-2020-23903",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2020-23903"
},
{
"cve": "CVE-2020-23904",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2020-23904"
},
{
"cve": "CVE-2021-33621",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2021-33621"
},
{
"cve": "CVE-2021-33657",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2021-33657"
},
{
"cve": "CVE-2021-3575",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2021-3575"
},
{
"cve": "CVE-2021-3618",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2021-3618"
},
{
"cve": "CVE-2021-43618",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2021-43618"
},
{
"cve": "CVE-2022-2097",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-2097"
},
{
"cve": "CVE-2022-21123",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21123"
},
{
"cve": "CVE-2022-21125",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21125"
},
{
"cve": "CVE-2022-21127",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21127"
},
{
"cve": "CVE-2022-21166",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21166"
},
{
"cve": "CVE-2022-21589",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21608",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-28805",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-28805"
},
{
"cve": "CVE-2022-30115",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-30115"
},
{
"cve": "CVE-2022-31783",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-31783"
},
{
"cve": "CVE-2022-33099",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-33099"
},
{
"cve": "CVE-2022-3729",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-3729"
},
{
"cve": "CVE-2022-37290",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-37290"
},
{
"cve": "CVE-2022-37434",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-39348",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-39348"
},
{
"cve": "CVE-2022-40897",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2022-41716",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41716"
},
{
"cve": "CVE-2022-41717",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41717"
},
{
"cve": "CVE-2022-41720",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41720"
},
{
"cve": "CVE-2022-41722",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41722"
},
{
"cve": "CVE-2022-41723",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41723"
},
{
"cve": "CVE-2022-41724",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41724"
},
{
"cve": "CVE-2022-41725",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-41725"
},
{
"cve": "CVE-2022-42898",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-42898"
},
{
"cve": "CVE-2022-42916",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-42916"
},
{
"cve": "CVE-2022-43551",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-43551"
},
{
"cve": "CVE-2022-43552",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-43552"
},
{
"cve": "CVE-2022-44617",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-44617"
},
{
"cve": "CVE-2022-44792",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-44792"
},
{
"cve": "CVE-2022-44793",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-44793"
},
{
"cve": "CVE-2022-46285",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-46285"
},
{
"cve": "CVE-2022-46663",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-46908",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-46908"
},
{
"cve": "CVE-2022-4743",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-4743"
},
{
"cve": "CVE-2022-48303",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-48303"
},
{
"cve": "CVE-2022-4883",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-4883"
},
{
"cve": "CVE-2022-4904",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2022-4904"
},
{
"cve": "CVE-2023-0002",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-0002"
},
{
"cve": "CVE-2023-0215",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0494",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-0494"
},
{
"cve": "CVE-2023-0547",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-0547"
},
{
"cve": "CVE-2023-1161",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1161"
},
{
"cve": "CVE-2023-1945",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1945"
},
{
"cve": "CVE-2023-1992",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1992"
},
{
"cve": "CVE-2023-1993",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1993"
},
{
"cve": "CVE-2023-1994",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1994"
},
{
"cve": "CVE-2023-1999",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-1999"
},
{
"cve": "CVE-2023-21526",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21526"
},
{
"cve": "CVE-2023-21756",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21756"
},
{
"cve": "CVE-2023-21911",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21911"
},
{
"cve": "CVE-2023-21912",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21919",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21919"
},
{
"cve": "CVE-2023-21920",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21920"
},
{
"cve": "CVE-2023-21929",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21929"
},
{
"cve": "CVE-2023-21933",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21933"
},
{
"cve": "CVE-2023-21935",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21935"
},
{
"cve": "CVE-2023-21940",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21940"
},
{
"cve": "CVE-2023-21945",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21945"
},
{
"cve": "CVE-2023-21946",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21946"
},
{
"cve": "CVE-2023-21947",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21947"
},
{
"cve": "CVE-2023-21953",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21953"
},
{
"cve": "CVE-2023-21955",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21955"
},
{
"cve": "CVE-2023-21962",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21962"
},
{
"cve": "CVE-2023-21966",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21966"
},
{
"cve": "CVE-2023-21972",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21972"
},
{
"cve": "CVE-2023-21976",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21976"
},
{
"cve": "CVE-2023-21977",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21977"
},
{
"cve": "CVE-2023-21980",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-21982",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21982"
},
{
"cve": "CVE-2023-21995",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-21995"
},
{
"cve": "CVE-2023-22006",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22006"
},
{
"cve": "CVE-2023-22023",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22023"
},
{
"cve": "CVE-2023-22036",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22036"
},
{
"cve": "CVE-2023-22041",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22041"
},
{
"cve": "CVE-2023-22044",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22044"
},
{
"cve": "CVE-2023-22045",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22045"
},
{
"cve": "CVE-2023-22049",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-22049"
},
{
"cve": "CVE-2023-23931",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-23931"
},
{
"cve": "CVE-2023-24021",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24021"
},
{
"cve": "CVE-2023-24532",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24532"
},
{
"cve": "CVE-2023-24534",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24534"
},
{
"cve": "CVE-2023-24536",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24536"
},
{
"cve": "CVE-2023-24537",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24537"
},
{
"cve": "CVE-2023-24538",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24538"
},
{
"cve": "CVE-2023-24539",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24539"
},
{
"cve": "CVE-2023-24540",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24540"
},
{
"cve": "CVE-2023-24932",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24932"
},
{
"cve": "CVE-2023-24998",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-25193",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-25193"
},
{
"cve": "CVE-2023-25652",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-25652"
},
{
"cve": "CVE-2023-25690",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-25815",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-25815"
},
{
"cve": "CVE-2023-26767",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-26767"
},
{
"cve": "CVE-2023-26768",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-26768"
},
{
"cve": "CVE-2023-26769",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-26769"
},
{
"cve": "CVE-2023-2731",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-2731"
},
{
"cve": "CVE-2023-27320",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-27320"
},
{
"cve": "CVE-2023-27522",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-28005",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28005"
},
{
"cve": "CVE-2023-28484",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28484"
},
{
"cve": "CVE-2023-28486",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28486"
},
{
"cve": "CVE-2023-28487",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28487"
},
{
"cve": "CVE-2023-28709",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28709"
},
{
"cve": "CVE-2023-28755",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28755"
},
{
"cve": "CVE-2023-28756",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-28756"
},
{
"cve": "CVE-2023-29007",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29007"
},
{
"cve": "CVE-2023-29400",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29400"
},
{
"cve": "CVE-2023-29469",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29469"
},
{
"cve": "CVE-2023-29479",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29479"
},
{
"cve": "CVE-2023-29531",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29531"
},
{
"cve": "CVE-2023-29532",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29532"
},
{
"cve": "CVE-2023-29533",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29533"
},
{
"cve": "CVE-2023-29535",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29535"
},
{
"cve": "CVE-2023-29536",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29536"
},
{
"cve": "CVE-2023-29539",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29539"
},
{
"cve": "CVE-2023-29541",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29541"
},
{
"cve": "CVE-2023-29542",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29542"
},
{
"cve": "CVE-2023-29545",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29545"
},
{
"cve": "CVE-2023-29548",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29548"
},
{
"cve": "CVE-2023-29550",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-29550"
},
{
"cve": "CVE-2023-30086",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-30086"
},
{
"cve": "CVE-2023-30608",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-30608"
},
{
"cve": "CVE-2023-30774",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-30774"
},
{
"cve": "CVE-2023-30775",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-30775"
},
{
"cve": "CVE-2023-31047",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-31047"
},
{
"cve": "CVE-2023-31284",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-31284"
},
{
"cve": "CVE-2023-32034",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32034"
},
{
"cve": "CVE-2023-32035",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32035"
},
{
"cve": "CVE-2023-32038",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32038"
},
{
"cve": "CVE-2023-32039",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32039"
},
{
"cve": "CVE-2023-32040",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32040"
},
{
"cve": "CVE-2023-32041",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32041"
},
{
"cve": "CVE-2023-32042",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32042"
},
{
"cve": "CVE-2023-32043",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32043"
},
{
"cve": "CVE-2023-32044",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32044"
},
{
"cve": "CVE-2023-32045",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32045"
},
{
"cve": "CVE-2023-32046",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32046"
},
{
"cve": "CVE-2023-32049",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32049"
},
{
"cve": "CVE-2023-32053",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32053"
},
{
"cve": "CVE-2023-32054",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32054"
},
{
"cve": "CVE-2023-32055",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32055"
},
{
"cve": "CVE-2023-32057",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32057"
},
{
"cve": "CVE-2023-32085",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32085"
},
{
"cve": "CVE-2023-32205",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32205"
},
{
"cve": "CVE-2023-32206",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32206"
},
{
"cve": "CVE-2023-32207",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32207"
},
{
"cve": "CVE-2023-32208",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32208"
},
{
"cve": "CVE-2023-32209",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32209"
},
{
"cve": "CVE-2023-32210",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32210"
},
{
"cve": "CVE-2023-32211",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32211"
},
{
"cve": "CVE-2023-32212",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32212"
},
{
"cve": "CVE-2023-32213",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32213"
},
{
"cve": "CVE-2023-32214",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32214"
},
{
"cve": "CVE-2023-32215",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32215"
},
{
"cve": "CVE-2023-32216",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32216"
},
{
"cve": "CVE-2023-32324",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-32324"
},
{
"cve": "CVE-2023-33134",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33134"
},
{
"cve": "CVE-2023-33154",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33154"
},
{
"cve": "CVE-2023-33157",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33157"
},
{
"cve": "CVE-2023-33160",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33160"
},
{
"cve": "CVE-2023-33164",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33164"
},
{
"cve": "CVE-2023-33166",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33166"
},
{
"cve": "CVE-2023-33167",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33167"
},
{
"cve": "CVE-2023-33168",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33168"
},
{
"cve": "CVE-2023-33169",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33169"
},
{
"cve": "CVE-2023-33172",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33172"
},
{
"cve": "CVE-2023-33173",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33173"
},
{
"cve": "CVE-2023-33174",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-33174"
},
{
"cve": "CVE-2023-34414",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-34414"
},
{
"cve": "CVE-2023-34415",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-34415"
},
{
"cve": "CVE-2023-34416",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-34416"
},
{
"cve": "CVE-2023-34417",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-34417"
},
{
"cve": "CVE-2023-3482",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-3482"
},
{
"cve": "CVE-2023-34981",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-34981"
},
{
"cve": "CVE-2023-35296",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35296"
},
{
"cve": "CVE-2023-35297",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35297"
},
{
"cve": "CVE-2023-35299",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35299"
},
{
"cve": "CVE-2023-35300",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35300"
},
{
"cve": "CVE-2023-35302",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35302"
},
{
"cve": "CVE-2023-35303",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35303"
},
{
"cve": "CVE-2023-35304",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35304"
},
{
"cve": "CVE-2023-35305",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35305"
},
{
"cve": "CVE-2023-35306",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35306"
},
{
"cve": "CVE-2023-35308",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35308"
},
{
"cve": "CVE-2023-35309",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35309"
},
{
"cve": "CVE-2023-35311",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35311"
},
{
"cve": "CVE-2023-35312",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35312"
},
{
"cve": "CVE-2023-35313",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35313"
},
{
"cve": "CVE-2023-35314",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35314"
},
{
"cve": "CVE-2023-35315",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35315"
},
{
"cve": "CVE-2023-35316",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35316"
},
{
"cve": "CVE-2023-35318",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35318"
},
{
"cve": "CVE-2023-35319",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35319"
},
{
"cve": "CVE-2023-35320",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35320"
},
{
"cve": "CVE-2023-35324",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35324"
},
{
"cve": "CVE-2023-35325",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35325"
},
{
"cve": "CVE-2023-35328",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35328"
},
{
"cve": "CVE-2023-35329",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35329"
},
{
"cve": "CVE-2023-35330",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35330"
},
{
"cve": "CVE-2023-35332",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35332"
},
{
"cve": "CVE-2023-35336",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35336"
},
{
"cve": "CVE-2023-35338",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35338"
},
{
"cve": "CVE-2023-35339",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35339"
},
{
"cve": "CVE-2023-35340",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35340"
},
{
"cve": "CVE-2023-35341",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35341"
},
{
"cve": "CVE-2023-35342",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35342"
},
{
"cve": "CVE-2023-35352",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35352"
},
{
"cve": "CVE-2023-35353",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35353"
},
{
"cve": "CVE-2023-35356",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35356"
},
{
"cve": "CVE-2023-35357",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35357"
},
{
"cve": "CVE-2023-35358",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35358"
},
{
"cve": "CVE-2023-35360",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35360"
},
{
"cve": "CVE-2023-35361",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35361"
},
{
"cve": "CVE-2023-35362",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35362"
},
{
"cve": "CVE-2023-35365",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35365"
},
{
"cve": "CVE-2023-35366",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35366"
},
{
"cve": "CVE-2023-35367",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-35367"
},
{
"cve": "CVE-2023-3600",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-3600"
},
{
"cve": "CVE-2023-36871",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-36871"
},
{
"cve": "CVE-2023-36874",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-36874"
},
{
"cve": "CVE-2023-36884",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-36884"
},
{
"cve": "CVE-2023-37201",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37201"
},
{
"cve": "CVE-2023-37202",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37202"
},
{
"cve": "CVE-2023-37203",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37203"
},
{
"cve": "CVE-2023-37204",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37204"
},
{
"cve": "CVE-2023-37205",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37205"
},
{
"cve": "CVE-2023-37206",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37206"
},
{
"cve": "CVE-2023-37207",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37207"
},
{
"cve": "CVE-2023-37208",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37208"
},
{
"cve": "CVE-2023-37209",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37209"
},
{
"cve": "CVE-2023-37210",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37210"
},
{
"cve": "CVE-2023-37211",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37211"
},
{
"cve": "CVE-2023-37212",
"product_status": {
"known_affected": [
"T029230",
"T014888",
"398363",
"T015632",
"T012167",
"74185"
]
},
"release_date": "2023-08-09T22:00:00.000+00:00",
"title": "CVE-2023-37212"
}
]
}
FKIE_CVE-2023-30775
Vulnerability from fkie_nvd - Published: 2023-05-19 15:15 - Updated: 2025-01-21 18:155.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
| URL | Tags | ||
|---|---|---|---|
| secalert@redhat.com | https://access.redhat.com/security/cve/CVE-2023-30775 | Third Party Advisory | |
| secalert@redhat.com | https://bugzilla.redhat.com/show_bug.cgi?id=2187141 | Issue Tracking, Third Party Advisory | |
| secalert@redhat.com | https://gitlab.com/libtiff/libtiff/-/issues/464 | Vendor Advisory | |
| secalert@redhat.com | https://security.netapp.com/advisory/ntap-20230703-0002/ | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://access.redhat.com/security/cve/CVE-2023-30775 | Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=2187141 | Issue Tracking, Third Party Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://gitlab.com/libtiff/libtiff/-/issues/464 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://security.netapp.com/advisory/ntap-20230703-0002/ |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libtiff:libtiff:4.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D49C1A38-70B8-4172-9FCD-F9E8848565C8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability was found in the libtiff library. This security flaw causes a heap buffer overflow in extractContigSamples32bits, tiffcrop.c."
}
],
"id": "CVE-2023-30775",
"lastModified": "2025-01-21T18:15:13.483",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2023-05-19T15:15:08.980",
"references": [
{
"source": "secalert@redhat.com",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"source": "secalert@redhat.com",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"source": "secalert@redhat.com",
"tags": [
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"source": "secalert@redhat.com",
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory"
],
"url": "https://access.redhat.com/security/cve/CVE-2023-30775"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Third Party Advisory"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=2187141"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://gitlab.com/libtiff/libtiff/-/issues/464"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://security.netapp.com/advisory/ntap-20230703-0002/"
}
],
"sourceIdentifier": "secalert@redhat.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "secalert@redhat.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "nvd@nist.gov",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-787"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.