Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2024-24792 (GCVE-0-2024-24792)
Vulnerability from cvelistv5 – Published: 2024-06-27 17:37 – Updated: 2024-08-01 23:28
VLAI?
EPSS
Title
Panic when parsing invalid palette-color images in golang.org/x/image
Summary
Parsing a corrupt or malicious image with invalid color indices can cause a panic.
Severity ?
7.5 (High)
CWE
- CWE-125 - Out-of-bounds Read
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| golang.org/x/image | golang.org/x/image/tiff |
Affected:
0 , < 0.18.0
(semver)
|
Credits
John Wright <jsw@google.com>
{
"containers": {
"adp": [
{
"affected": [
{
"cpes": [
"cpe:2.3:a:golang:image:*:*:*:*:*:go:*:*"
],
"defaultStatus": "unknown",
"product": "image",
"vendor": "golang",
"versions": [
{
"lessThan": "0.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2024-24792",
"options": [
{
"Exploitation": "poc"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-07-17T15:53:18.409742Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-07-18T15:22:35.789Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
},
{
"providerMetadata": {
"dateUpdated": "2024-08-01T23:28:12.747Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/cl/588115"
},
{
"tags": [
"x_transferred"
],
"url": "https://go.dev/issue/67624"
},
{
"tags": [
"x_transferred"
],
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"collectionURL": "https://pkg.go.dev",
"defaultStatus": "unaffected",
"packageName": "golang.org/x/image/tiff",
"product": "golang.org/x/image/tiff",
"programRoutines": [
{
"name": "decoder.decode"
},
{
"name": "Decode"
}
],
"vendor": "golang.org/x/image",
"versions": [
{
"lessThan": "0.18.0",
"status": "affected",
"version": "0",
"versionType": "semver"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "John Wright \u003cjsw@google.com\u003e"
}
],
"descriptions": [
{
"lang": "en",
"value": "Parsing a corrupt or malicious image with invalid color indices can cause a panic."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "CWE-125: Out-of-bounds Read",
"lang": "en"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-06-27T17:37:38.560Z",
"orgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"shortName": "Go"
},
"references": [
{
"url": "https://go.dev/cl/588115"
},
{
"url": "https://go.dev/issue/67624"
},
{
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
}
],
"title": "Panic when parsing invalid palette-color images in golang.org/x/image"
}
},
"cveMetadata": {
"assignerOrgId": "1bb62c36-49e3-4200-9d77-64a1400537cc",
"assignerShortName": "Go",
"cveId": "CVE-2024-24792",
"datePublished": "2024-06-27T17:37:38.560Z",
"dateReserved": "2024-01-30T16:05:14.758Z",
"dateUpdated": "2024-08-01T23:28:12.747Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"descriptions": "[{\"lang\": \"en\", \"value\": \"Parsing a corrupt or malicious image with invalid color indices can cause a panic.\"}, {\"lang\": \"es\", \"value\": \"Analizar una imagen corrupta o maliciosa con \\u00edndices de color no v\\u00e1lidos puede provocar p\\u00e1nico.\"}]",
"id": "CVE-2024-24792",
"lastModified": "2024-11-21T08:59:43.203",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}]}",
"published": "2024-06-27T18:15:13.740",
"references": "[{\"url\": \"https://go.dev/cl/588115\", \"source\": \"security@golang.org\"}, {\"url\": \"https://go.dev/issue/67624\", \"source\": \"security@golang.org\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2937\", \"source\": \"security@golang.org\"}, {\"url\": \"https://go.dev/cl/588115\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://go.dev/issue/67624\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2937\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Awaiting Analysis"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-24792\",\"sourceIdentifier\":\"security@golang.org\",\"published\":\"2024-06-27T18:15:13.740\",\"lastModified\":\"2024-11-21T08:59:43.203\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Parsing a corrupt or malicious image with invalid color indices can cause a panic.\"},{\"lang\":\"es\",\"value\":\"Analizar una imagen corrupta o maliciosa con \u00edndices de color no v\u00e1lidos puede provocar p\u00e1nico.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}]},\"references\":[{\"url\":\"https://go.dev/cl/588115\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/issue/67624\",\"source\":\"security@golang.org\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2024-2937\",\"source\":\"security@golang.org\"},{\"url\":\"https://go.dev/cl/588115\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://go.dev/issue/67624\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://pkg.go.dev/vuln/GO-2024-2937\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://go.dev/cl/588115\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://go.dev/issue/67624\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2937\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T23:28:12.747Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.5, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-24792\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-07-17T15:53:18.409742Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:golang:image:*:*:*:*:*:go:*:*\"], \"vendor\": \"golang\", \"product\": \"image\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.18.0\", \"versionType\": \"semver\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-07-17T16:22:27.766Z\"}}], \"cna\": {\"title\": \"Panic when parsing invalid palette-color images in golang.org/x/image\", \"credits\": [{\"lang\": \"en\", \"value\": \"John Wright \u003cjsw@google.com\u003e\"}], \"affected\": [{\"vendor\": \"golang.org/x/image\", \"product\": \"golang.org/x/image/tiff\", \"versions\": [{\"status\": \"affected\", \"version\": \"0\", \"lessThan\": \"0.18.0\", \"versionType\": \"semver\"}], \"packageName\": \"golang.org/x/image/tiff\", \"collectionURL\": \"https://pkg.go.dev\", \"defaultStatus\": \"unaffected\", \"programRoutines\": [{\"name\": \"decoder.decode\"}, {\"name\": \"Decode\"}]}], \"references\": [{\"url\": \"https://go.dev/cl/588115\"}, {\"url\": \"https://go.dev/issue/67624\"}, {\"url\": \"https://pkg.go.dev/vuln/GO-2024-2937\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"Parsing a corrupt or malicious image with invalid color indices can cause a panic.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"CWE-125: Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"shortName\": \"Go\", \"dateUpdated\": \"2024-06-27T17:37:38.560Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-24792\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-01T23:28:12.747Z\", \"dateReserved\": \"2024-01-30T16:05:14.758Z\", \"assignerOrgId\": \"1bb62c36-49e3-4200-9d77-64a1400537cc\", \"datePublished\": \"2024-06-27T17:37:38.560Z\", \"assignerShortName\": \"Go\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
FKIE_CVE-2024-24792
Vulnerability from fkie_nvd - Published: 2024-06-27 18:15 - Updated: 2024-11-21 08:59
Severity ?
Summary
Parsing a corrupt or malicious image with invalid color indices can cause a panic.
References
Impacted products
| Vendor | Product | Version |
|---|
{
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Parsing a corrupt or malicious image with invalid color indices can cause a panic."
},
{
"lang": "es",
"value": "Analizar una imagen corrupta o maliciosa con \u00edndices de color no v\u00e1lidos puede provocar p\u00e1nico."
}
],
"id": "CVE-2024-24792",
"lastModified": "2024-11-21T08:59:43.203",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2024-06-27T18:15:13.740",
"references": [
{
"source": "security@golang.org",
"url": "https://go.dev/cl/588115"
},
{
"source": "security@golang.org",
"url": "https://go.dev/issue/67624"
},
{
"source": "security@golang.org",
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://go.dev/cl/588115"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://go.dev/issue/67624"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
}
],
"sourceIdentifier": "security@golang.org",
"vulnStatus": "Awaiting Analysis"
}
OPENSUSE-SU-2024:14099-1
Vulnerability from csaf_opensuse - Published: 2024-07-04 00:00 - Updated: 2024-07-04 00:00Summary
gomuks-0.3.0-3.1 on GA media
Notes
Title of the patch
gomuks-0.3.0-3.1 on GA media
Description of the patch
These are all security issues fixed in the gomuks-0.3.0-3.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14099
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "gomuks-0.3.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the gomuks-0.3.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14099",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14099-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24792 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24792/"
}
],
"title": "gomuks-0.3.0-3.1 on GA media",
"tracking": {
"current_release_date": "2024-07-04T00:00:00Z",
"generator": {
"date": "2024-07-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14099-1",
"initial_release_date": "2024-07-04T00:00:00Z",
"revision_history": [
{
"date": "2024-07-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "gomuks-0.3.0-3.1.aarch64",
"product": {
"name": "gomuks-0.3.0-3.1.aarch64",
"product_id": "gomuks-0.3.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "gomuks-0.3.0-3.1.ppc64le",
"product": {
"name": "gomuks-0.3.0-3.1.ppc64le",
"product_id": "gomuks-0.3.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "gomuks-0.3.0-3.1.s390x",
"product": {
"name": "gomuks-0.3.0-3.1.s390x",
"product_id": "gomuks-0.3.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "gomuks-0.3.0-3.1.x86_64",
"product": {
"name": "gomuks-0.3.0-3.1.x86_64",
"product_id": "gomuks-0.3.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "gomuks-0.3.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gomuks-0.3.0-3.1.aarch64"
},
"product_reference": "gomuks-0.3.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gomuks-0.3.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gomuks-0.3.0-3.1.ppc64le"
},
"product_reference": "gomuks-0.3.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gomuks-0.3.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gomuks-0.3.0-3.1.s390x"
},
"product_reference": "gomuks-0.3.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "gomuks-0.3.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:gomuks-0.3.0-3.1.x86_64"
},
"product_reference": "gomuks-0.3.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24792"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a corrupt or malicious image with invalid color indices can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.aarch64",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.ppc64le",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.s390x",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24792",
"url": "https://www.suse.com/security/cve/CVE-2024-24792"
},
{
"category": "external",
"summary": "SUSE Bug 1227158 for CVE-2024-24792",
"url": "https://bugzilla.suse.com/1227158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.aarch64",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.ppc64le",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.s390x",
"openSUSE Tumbleweed:gomuks-0.3.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-04T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-24792"
}
]
}
OPENSUSE-SU-2024:14108-1
Vulnerability from csaf_opensuse - Published: 2024-07-05 00:00 - Updated: 2024-07-05 00:00Summary
kbfs-6.3.1-2.1 on GA media
Notes
Title of the patch
kbfs-6.3.1-2.1 on GA media
Description of the patch
These are all security issues fixed in the kbfs-6.3.1-2.1 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-14108
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "kbfs-6.3.1-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the kbfs-6.3.1-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-14108",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_14108-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24792 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24792/"
}
],
"title": "kbfs-6.3.1-2.1 on GA media",
"tracking": {
"current_release_date": "2024-07-05T00:00:00Z",
"generator": {
"date": "2024-07-05T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:14108-1",
"initial_release_date": "2024-07-05T00:00:00Z",
"revision_history": [
{
"date": "2024-07-05T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.3.1-2.1.aarch64",
"product": {
"name": "kbfs-6.3.1-2.1.aarch64",
"product_id": "kbfs-6.3.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.3.1-2.1.aarch64",
"product": {
"name": "kbfs-git-6.3.1-2.1.aarch64",
"product_id": "kbfs-git-6.3.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.3.1-2.1.aarch64",
"product": {
"name": "kbfs-tool-6.3.1-2.1.aarch64",
"product_id": "kbfs-tool-6.3.1-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "keybase-client-6.3.1-2.1.aarch64",
"product": {
"name": "keybase-client-6.3.1-2.1.aarch64",
"product_id": "keybase-client-6.3.1-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.3.1-2.1.ppc64le",
"product": {
"name": "kbfs-6.3.1-2.1.ppc64le",
"product_id": "kbfs-6.3.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.3.1-2.1.ppc64le",
"product": {
"name": "kbfs-git-6.3.1-2.1.ppc64le",
"product_id": "kbfs-git-6.3.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.3.1-2.1.ppc64le",
"product": {
"name": "kbfs-tool-6.3.1-2.1.ppc64le",
"product_id": "kbfs-tool-6.3.1-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "keybase-client-6.3.1-2.1.ppc64le",
"product": {
"name": "keybase-client-6.3.1-2.1.ppc64le",
"product_id": "keybase-client-6.3.1-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.3.1-2.1.s390x",
"product": {
"name": "kbfs-6.3.1-2.1.s390x",
"product_id": "kbfs-6.3.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.3.1-2.1.s390x",
"product": {
"name": "kbfs-git-6.3.1-2.1.s390x",
"product_id": "kbfs-git-6.3.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.3.1-2.1.s390x",
"product": {
"name": "kbfs-tool-6.3.1-2.1.s390x",
"product_id": "kbfs-tool-6.3.1-2.1.s390x"
}
},
{
"category": "product_version",
"name": "keybase-client-6.3.1-2.1.s390x",
"product": {
"name": "keybase-client-6.3.1-2.1.s390x",
"product_id": "keybase-client-6.3.1-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.3.1-2.1.x86_64",
"product": {
"name": "kbfs-6.3.1-2.1.x86_64",
"product_id": "kbfs-6.3.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.3.1-2.1.x86_64",
"product": {
"name": "kbfs-git-6.3.1-2.1.x86_64",
"product_id": "kbfs-git-6.3.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.3.1-2.1.x86_64",
"product": {
"name": "kbfs-tool-6.3.1-2.1.x86_64",
"product_id": "kbfs-tool-6.3.1-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "keybase-client-6.3.1-2.1.x86_64",
"product": {
"name": "keybase-client-6.3.1-2.1.x86_64",
"product_id": "keybase-client-6.3.1-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.3.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-6.3.1-2.1.aarch64"
},
"product_reference": "kbfs-6.3.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.3.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-6.3.1-2.1.ppc64le"
},
"product_reference": "kbfs-6.3.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.3.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-6.3.1-2.1.s390x"
},
"product_reference": "kbfs-6.3.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.3.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-6.3.1-2.1.x86_64"
},
"product_reference": "kbfs-6.3.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.3.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.aarch64"
},
"product_reference": "kbfs-git-6.3.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.3.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.ppc64le"
},
"product_reference": "kbfs-git-6.3.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.3.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.s390x"
},
"product_reference": "kbfs-git-6.3.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.3.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.x86_64"
},
"product_reference": "kbfs-git-6.3.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.3.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.aarch64"
},
"product_reference": "kbfs-tool-6.3.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.3.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.ppc64le"
},
"product_reference": "kbfs-tool-6.3.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.3.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.s390x"
},
"product_reference": "kbfs-tool-6.3.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.3.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.x86_64"
},
"product_reference": "kbfs-tool-6.3.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.3.1-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keybase-client-6.3.1-2.1.aarch64"
},
"product_reference": "keybase-client-6.3.1-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.3.1-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keybase-client-6.3.1-2.1.ppc64le"
},
"product_reference": "keybase-client-6.3.1-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.3.1-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keybase-client-6.3.1-2.1.s390x"
},
"product_reference": "keybase-client-6.3.1-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.3.1-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:keybase-client-6.3.1-2.1.x86_64"
},
"product_reference": "keybase-client-6.3.1-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24792"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a corrupt or malicious image with invalid color indices can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24792",
"url": "https://www.suse.com/security/cve/CVE-2024-24792"
},
{
"category": "external",
"summary": "SUSE Bug 1227158 for CVE-2024-24792",
"url": "https://bugzilla.suse.com/1227158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-git-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:kbfs-tool-6.3.1-2.1.x86_64",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.aarch64",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.ppc64le",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.s390x",
"openSUSE Tumbleweed:keybase-client-6.3.1-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-05T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2024-24792"
}
]
}
OPENSUSE-SU-2024:0224-2
Vulnerability from csaf_opensuse - Published: 2024-07-26 18:12 - Updated: 2024-07-26 18:12Summary
Security update for keybase-client
Notes
Title of the patch
Security update for keybase-client
Description of the patch
This update for keybase-client fixes the following issues:
- Update the Image dependency to address CVE-2024-24792 (boo#1227167).
Patchnames
openSUSE-2024-224
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for keybase-client",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for keybase-client fixes the following issues:\n\n- Update the Image dependency to address CVE-2024-24792 (boo#1227167).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-2024-224",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_0224-2.json"
},
{
"category": "self",
"summary": "URL for openSUSE-SU-2024:0224-2",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXB4SKOPE2SZAUL5AG6RPXV7XINWBOYH/"
},
{
"category": "self",
"summary": "E-Mail link for openSUSE-SU-2024:0224-2",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/GXB4SKOPE2SZAUL5AG6RPXV7XINWBOYH/"
},
{
"category": "self",
"summary": "SUSE Bug 1227167",
"url": "https://bugzilla.suse.com/1227167"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2024-24792 page",
"url": "https://www.suse.com/security/cve/CVE-2024-24792/"
}
],
"title": "Security update for keybase-client",
"tracking": {
"current_release_date": "2024-07-26T18:12:13Z",
"generator": {
"date": "2024-07-26T18:12:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:0224-2",
"initial_release_date": "2024-07-26T18:12:13Z",
"revision_history": [
{
"date": "2024-07-26T18:12:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"product": {
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"product_id": "kbfs-6.2.8-bp156.2.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"product": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"product_id": "kbfs-git-6.2.8-bp156.2.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"product": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"product_id": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"product": {
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"product_id": "keybase-client-6.2.8-bp156.2.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.2.8-bp156.2.6.1.i586",
"product": {
"name": "kbfs-6.2.8-bp156.2.6.1.i586",
"product_id": "kbfs-6.2.8-bp156.2.6.1.i586"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"product": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"product_id": "kbfs-git-6.2.8-bp156.2.6.1.i586"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"product": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"product_id": "kbfs-tool-6.2.8-bp156.2.6.1.i586"
}
},
{
"category": "product_version",
"name": "keybase-client-6.2.8-bp156.2.6.1.i586",
"product": {
"name": "keybase-client-6.2.8-bp156.2.6.1.i586",
"product_id": "keybase-client-6.2.8-bp156.2.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"product": {
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"product_id": "kbfs-6.2.8-bp156.2.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"product": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"product_id": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"product": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"product_id": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"product": {
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"product_id": "keybase-client-6.2.8-bp156.2.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.2.8-bp156.2.6.1.s390x",
"product": {
"name": "kbfs-6.2.8-bp156.2.6.1.s390x",
"product_id": "kbfs-6.2.8-bp156.2.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"product": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"product_id": "kbfs-git-6.2.8-bp156.2.6.1.s390x"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"product": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"product_id": "kbfs-tool-6.2.8-bp156.2.6.1.s390x"
}
},
{
"category": "product_version",
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"product": {
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"product_id": "keybase-client-6.2.8-bp156.2.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"product": {
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"product_id": "kbfs-6.2.8-bp156.2.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"product": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"product_id": "kbfs-git-6.2.8-bp156.2.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"product": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"product_id": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"product": {
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"product_id": "keybase-client-6.2.8-bp156.2.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP5",
"product": {
"name": "SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5"
}
},
{
"category": "product_name",
"name": "SUSE Package Hub 15 SP6",
"product": {
"name": "SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6"
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP5",
"product_id": "SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.i586 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64 as component of SUSE Package Hub 15 SP6",
"product_id": "SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "SUSE Package Hub 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-git-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.aarch64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.i586 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.i586"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.i586",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.ppc64le"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.s390x"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "keybase-client-6.2.8-bp156.2.6.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.x86_64"
},
"product_reference": "keybase-client-6.2.8-bp156.2.6.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2024-24792",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2024-24792"
}
],
"notes": [
{
"category": "general",
"text": "Parsing a corrupt or malicious image with invalid color indices can cause a panic.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2024-24792",
"url": "https://www.suse.com/security/cve/CVE-2024-24792"
},
{
"category": "external",
"summary": "SUSE Bug 1227158 for CVE-2024-24792",
"url": "https://bugzilla.suse.com/1227158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP5:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.i586",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.s390x",
"SUSE Package Hub 15 SP6:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.5:keybase-client-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-git-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:kbfs-tool-6.2.8-bp156.2.6.1.x86_64",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.aarch64",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.i586",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.ppc64le",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.s390x",
"openSUSE Leap 15.6:keybase-client-6.2.8-bp156.2.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-07-26T18:12:13Z",
"details": "important"
}
],
"title": "CVE-2024-24792"
}
]
}
GSD-2024-24792
Vulnerability from gsd - Updated: 2024-01-31 06:02Details
** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided.
Aliases
{
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2024-24792"
],
"id": "GSD-2024-24792",
"modified": "2024-01-31T06:02:39.922567Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2024-24792",
"STATE": "RESERVED"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided."
}
]
}
}
}
}
GHSA-9PHM-FM57-RHG8
Vulnerability from github – Published: 2024-06-26 19:26 – Updated: 2024-08-02 15:50
VLAI?
Summary
Panic when parsing invalid palette-color images in golang.org/x/image
Details
Parsing a corrupt or malicious image with invalid color indices can cause a panic.
Severity ?
{
"affected": [
{
"package": {
"ecosystem": "Go",
"name": "golang.org/x/image"
},
"ranges": [
{
"events": [
{
"introduced": "0"
},
{
"fixed": "0.18.0"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2024-24792"
],
"database_specific": {
"cwe_ids": [
"CWE-248"
],
"github_reviewed": true,
"github_reviewed_at": "2024-06-26T19:26:38Z",
"nvd_published_at": "2024-06-27T18:15:13Z",
"severity": "HIGH"
},
"details": "Parsing a corrupt or malicious image with invalid color indices can cause a panic.",
"id": "GHSA-9phm-fm57-rhg8",
"modified": "2024-08-02T15:50:53Z",
"published": "2024-06-26T19:26:38Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-24792"
},
{
"type": "PACKAGE",
"url": "https://cs.opensource.google/go/x/image"
},
{
"type": "WEB",
"url": "https://go.dev/cl/588115"
},
{
"type": "WEB",
"url": "https://go.dev/issue/67624"
},
{
"type": "WEB",
"url": "https://pkg.go.dev/vuln/GO-2024-2937"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
},
{
"score": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"type": "CVSS_V4"
}
],
"summary": "Panic when parsing invalid palette-color images in golang.org/x/image"
}
CERTFR-2026-AVI-0209
Vulnerability from certfr_avis - Published: 2026-02-25 - Updated: 2026-02-25
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Spring Cloud Data Flow pour Tanzu versions antérieures à 1.14.11 | ||
| VMware | Tanzu Kubernetes Runtime | Single Sign-On pour Tanzu Platform versions antérieures à 1.16.17 | ||
| VMware | Tanzu Kubernetes Runtime | Ruby Buildpack versions antérieures à 1.10.60 | ||
| VMware | Tanzu Kubernetes Runtime | Isolation Segmentation pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T | ||
| VMware | Tanzu Kubernetes Runtime | Platform Automation Toolkit versions antérieures à 5.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Python Buildpack versions antérieures à 1.8.80 | ||
| VMware | Tanzu Kubernetes Runtime | API Gateway pour Tanzu Platform versions antérieures à 2.4.2 | ||
| VMware | Tanzu Kubernetes Runtime | Compliance Scanning pour Tanzu Platform versions antérieures à 1.3.29 | ||
| VMware | Tanzu Kubernetes Runtime | Greffon Elastic Application Runtime Windows pour Tanzu Platform versions antérieures à 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | App Autoscaler CLI Plugin pour Tanzu Platform versions antérieures à 250.6.6 | ||
| VMware | Tanzu Kubernetes Runtime | Application Services pour Tanzu Platform versions antérieures à 3.3.15 | ||
| VMware | Tanzu Kubernetes Runtime | Scheduler pour Tanzu Platform versions antérieures à 2.0.24 | ||
| VMware | Tanzu Kubernetes Runtime | Service Publisher for VMware Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Anti-Virus Scanning pour Tanzu Platform versions antérieures à 2.4.3 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | File Integrity Monitoring pour Tanzu Platform versions antérieures à 2.1.50 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de sécurité | ||
| VMware | Tanzu Kubernetes Runtime | Metric Store versions antérieures à 1.8.2 | ||
| VMware | Tanzu Kubernetes Runtime | PHP Buildpack versions antérieures à 4.6.65 |
References
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Spring Cloud Data Flow pour Tanzu versions ant\u00e9rieures \u00e0 1.14.11",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Single Sign-On pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.16.17",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Ruby Buildpack versions ant\u00e9rieures \u00e0 1.10.60",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.3.5 et 10.2.8+LTS-T",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Python Buildpack versions ant\u00e9rieures \u00e0 1.8.80",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "API Gateway pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Compliance Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 1.3.29",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Greffon Elastic Application Runtime Windows pour Tanzu Platform versions ant\u00e9rieures \u00e0 6.0.25+LTS-T, 10.2.8+LTS-T et 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy Azure Light) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "App Autoscaler CLI Plugin pour Tanzu Platform versions ant\u00e9rieures \u00e0 250.6.6",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Application Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 3.3.15",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Scheduler pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.0.24",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Service Publisher for VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Anti-Virus Scanning pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.3",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy FIPS) versions 1.1065.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "File Integrity Monitoring pour Tanzu Platform versions ant\u00e9rieures \u00e0 2.1.50",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions 1.1033.x sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Metric Store versions ant\u00e9rieures \u00e0 1.8.2",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "PHP Buildpack versions ant\u00e9rieures \u00e0 4.6.65",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2025-66199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66199"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2025-8556",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8556"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-8277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8277"
},
{
"name": "CVE-2025-66614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66614"
},
{
"name": "CVE-2025-15469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15469"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2023-29408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29408"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2025-9820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9820"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-27144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27144"
},
{
"name": "CVE-2026-21226",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21226"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2024-35255",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-35255"
},
{
"name": "CVE-2024-24557",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24557"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2024-6104",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6104"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2026-0966",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2023-29407",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29407"
},
{
"name": "CVE-2026-26958",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-26958"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2023-42365",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42365"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2026-0964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0964"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-41253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41253"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2022-48174",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48174"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2023-42364",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42364"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2026-0965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0965"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2026-23949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23949"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2024-24792",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-24792"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2026-0967",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0967"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-15468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15468"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2026-0968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0968"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2025-69277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69277"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2026-24733",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24733"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2024-27282",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-27282"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-11187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11187"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2022-41727",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41727"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2023-42363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42363"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2026-1225",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1225"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2026-22703",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22703"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2025-14831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14831"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-25T00:00:00",
"last_revision_date": "2026-02-25T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0209",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-25T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37064",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37064"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37049",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37049"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37075",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37075"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37071",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37071"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37054",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37054"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37069",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37069"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37067",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37067"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37032",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37032"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37028",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37028"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37063",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37063"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37027",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37027"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37059",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37059"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37042",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37042"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37026",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37026"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37060",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37060"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37048",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37048"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37034",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37034"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37065",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37065"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37040",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37040"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37074",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37074"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37057",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37057"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37070",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37070"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37043",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37043"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37037",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37037"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37061",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37061"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37051",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37051"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37053",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37053"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37035",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37035"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37036",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37036"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37041",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37041"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37062",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37062"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37038",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37038"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37055",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37055"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37025",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37025"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37029",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37029"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37045",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37045"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37044",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37044"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37072",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37072"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37046",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37046"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37058",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37058"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37066",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37066"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37068",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37068"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37052",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37052"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37033",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37033"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37073",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37073"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37056",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37056"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37050",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37050"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37030",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37030"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37031",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37031"
},
{
"published_at": "2026-02-24",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37039",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37039"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…