Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2023-32732 (GCVE-0-2023-32732)
Vulnerability from cvelistv5 – Published: 2023-06-09 10:48 – Updated: 2025-02-13 16:55- CWE-440 - Expected Behavior Violation
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T15:25:36.637Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"tags": [
"x_transferred"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
}
],
"title": "CVE Program Container"
},
{
"affected": [
{
"cpes": [
"cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*"
],
"defaultStatus": "unknown",
"product": "grpc",
"vendor": "grpc",
"versions": [
{
"lessThan": "1.54",
"status": "affected",
"version": "1.53",
"versionType": "custom"
}
]
}
],
"metrics": [
{
"other": {
"content": {
"id": "CVE-2023-32732",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-09-26T18:59:27.982940Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-09-26T19:03:12.183Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "gRPC",
"vendor": "Google",
"versions": [
{
"lessThan": "1.54",
"status": "affected",
"version": "1.53",
"versionType": "custom"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u0026nbsp;\u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://www.google.com/url?sa=D\u0026amp;q=https%3A%2F%2Fgithub.com%2Fgrpc%2Fgrpc%2Fpull%2F32309\"\u003ehttps://github.com/grpc/grpc/pull/32309\u003c/a\u003e\u003cbr\u003e"
}
],
"value": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url"
}
],
"impacts": [
{
"capecId": "CAPEC-220",
"descriptions": [
{
"lang": "en",
"value": "CAPEC-220 Client-Server Protocol Manipulation"
}
]
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-440",
"description": "CWE-440: Expected Behavior Violation",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2023-07-23T02:06:09.201Z",
"orgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"shortName": "Google"
},
"references": [
{
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
}
],
"solutions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Fixes available in these releases:\u003cbr\u003e- 1.52.2: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.52.2\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.52.2\u003c/a\u003e\u003cbr\u003e- 1.53.1: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.53.1\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.53.1\u003c/a\u003e\u003cbr\u003e- 1.54.2: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.54.2\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.54.2\u003c/a\u003e\u003cbr\u003e- 1.55.0: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.55.0\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.55.0\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Fixes available in these releases:\n- 1.52.2: https://github.com/grpc/grpc/releases/tag/v1.52.2 https://github.com/grpc/grpc/releases/tag/v1.52.2 \n- 1.53.1: https://github.com/grpc/grpc/releases/tag/v1.53.1 https://github.com/grpc/grpc/releases/tag/v1.53.1 \n- 1.54.2: https://github.com/grpc/grpc/releases/tag/v1.54.2 https://github.com/grpc/grpc/releases/tag/v1.54.2 \n- 1.55.0: https://github.com/grpc/grpc/releases/tag/v1.55.0 https://github.com/grpc/grpc/releases/tag/v1.55.0"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "Denial-of-Service in gRPC",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "14ed7db2-1595-443d-9d34-6215bf890778",
"assignerShortName": "Google",
"cveId": "CVE-2023-32732",
"datePublished": "2023-06-09T10:48:15.075Z",
"dateReserved": "2023-05-12T08:58:54.033Z",
"dateUpdated": "2025-02-13T16:55:01.392Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"1.53.0\", \"matchCriteriaId\": \"97BFBCEF-3DA4-4DD4-881F-5F3940614E30\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \\n\"}, {\"lang\": \"es\", \"value\": \"gRPC contiene una vulnerabilidad por la que un cliente puede provocar la finalizaci\\u00f3n de la conexi\\u00f3n entre un proxy HTTP2 y un servidor gRPC. Un error de codificaci\\u00f3n en base64 para cabeceras con sufijo \\\"-bin\\\" provocar\\u00e1 la desconexi\\u00f3n por parte del servidor gRPC, pero suele estar permitido por los proxies HTTP2. Se recomienda actualizar m\\u00e1s all\\u00e1 del commit \\\"https://github.com/grpc/grpc/pull/32309\\\".\"}]",
"id": "CVE-2023-32732",
"lastModified": "2024-11-21T08:03:55.950",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"LOW\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}]}",
"published": "2023-06-09T11:15:09.377",
"references": "[{\"url\": \"https://github.com/grpc/grpc/pull/32309\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\", \"source\": \"cve-coordination@google.com\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://github.com/grpc/grpc/pull/32309\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Issue Tracking\", \"Patch\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Mailing List\"]}]",
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"cve-coordination@google.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-440\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2023-32732\",\"sourceIdentifier\":\"cve-coordination@google.com\",\"published\":\"2023-06-09T11:15:09.377\",\"lastModified\":\"2025-02-13T17:16:32.953\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url\"},{\"lang\":\"es\",\"value\":\"gRPC contiene una vulnerabilidad por la que un cliente puede provocar la finalizaci\u00f3n de la conexi\u00f3n entre un proxy HTTP2 y un servidor gRPC. Un error de codificaci\u00f3n en base64 para cabeceras con sufijo \\\"-bin\\\" provocar\u00e1 la desconexi\u00f3n por parte del servidor gRPC, pero suele estar permitido por los proxies HTTP2. Se recomienda actualizar m\u00e1s all\u00e1 del commit \\\"https://github.com/grpc/grpc/pull/32309\\\".\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"LOW\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}]},\"weaknesses\":[{\"source\":\"cve-coordination@google.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-440\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.53.0\",\"matchCriteriaId\":\"97BFBCEF-3DA4-4DD4-881F-5F3940614E30\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E30D0E6F-4AE8-4284-8716-991DFA48CC5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC559B26-5DFC-4B7A-A27C-B77DE755DFF9\"}]}]}],\"references\":[{\"url\":\"https://github.com/grpc/grpc/pull/32309\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\",\"source\":\"cve-coordination@google.com\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://github.com/grpc/grpc/pull/32309\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Issue Tracking\",\"Patch\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]},{\"url\":\"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://github.com/grpc/grpc/pull/32309\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T15:25:36.637Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-32732\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-09-26T18:59:27.982940Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*\"], \"vendor\": \"grpc\", \"product\": \"grpc\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.53\", \"lessThan\": \"1.54\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-09-26T19:03:04.618Z\"}}], \"cna\": {\"title\": \"Denial-of-Service in gRPC\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"impacts\": [{\"capecId\": \"CAPEC-220\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-220 Client-Server Protocol Manipulation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 5.3, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Google\", \"product\": \"gRPC\", \"versions\": [{\"status\": \"affected\", \"version\": \"1.53\", \"lessThan\": \"1.54\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"solutions\": [{\"lang\": \"en\", \"value\": \"Fixes available in these releases:\\n- 1.52.2: https://github.com/grpc/grpc/releases/tag/v1.52.2 https://github.com/grpc/grpc/releases/tag/v1.52.2 \\n- 1.53.1: https://github.com/grpc/grpc/releases/tag/v1.53.1 https://github.com/grpc/grpc/releases/tag/v1.53.1 \\n- 1.54.2: https://github.com/grpc/grpc/releases/tag/v1.54.2 https://github.com/grpc/grpc/releases/tag/v1.54.2 \\n- 1.55.0: https://github.com/grpc/grpc/releases/tag/v1.55.0 https://github.com/grpc/grpc/releases/tag/v1.55.0\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Fixes available in these releases:\u003cbr\u003e- 1.52.2: \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://github.com/grpc/grpc/releases/tag/v1.52.2\\\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.52.2\u003c/a\u003e\u003cbr\u003e- 1.53.1: \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://github.com/grpc/grpc/releases/tag/v1.53.1\\\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.53.1\u003c/a\u003e\u003cbr\u003e- 1.54.2: \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://github.com/grpc/grpc/releases/tag/v1.54.2\\\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.54.2\u003c/a\u003e\u003cbr\u003e- 1.55.0: \u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://github.com/grpc/grpc/releases/tag/v1.55.0\\\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.55.0\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e\", \"base64\": false}]}], \"references\": [{\"url\": \"https://github.com/grpc/grpc/pull/32309\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\"}, {\"url\": \"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u0026nbsp;\u003ca target=\\\"_blank\\\" rel=\\\"nofollow\\\" href=\\\"https://www.google.com/url?sa=D\u0026amp;q=https%3A%2F%2Fgithub.com%2Fgrpc%2Fgrpc%2Fpull%2F32309\\\"\u003ehttps://github.com/grpc/grpc/pull/32309\u003c/a\u003e\u003cbr\u003e\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-440\", \"description\": \"CWE-440: Expected Behavior Violation\"}]}], \"providerMetadata\": {\"orgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"shortName\": \"Google\", \"dateUpdated\": \"2023-07-23T02:06:09.201Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2023-32732\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-02-13T16:55:01.392Z\", \"dateReserved\": \"2023-05-12T08:58:54.033Z\", \"assignerOrgId\": \"14ed7db2-1595-443d-9d34-6215bf890778\", \"datePublished\": \"2023-06-09T10:48:15.075Z\", \"assignerShortName\": \"Google\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
GHSA-9HXF-PPJV-W6RQ
Vulnerability from github – Published: 2023-07-06 21:15 – Updated: 2025-08-13 15:00gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for -bin suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309.
{
"affected": [
{
"package": {
"ecosystem": "Maven",
"name": "io.grpc:grpc-protobuf"
},
"ranges": [
{
"events": [
{
"introduced": "1.53.0"
},
{
"fixed": "1.53.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "grpcio"
},
"ranges": [
{
"events": [
{
"introduced": "1.53.0"
},
{
"fixed": "1.53.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "grpc"
},
"ranges": [
{
"events": [
{
"introduced": "1.53.0"
},
{
"fixed": "1.53.1"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "Maven",
"name": "io.grpc:grpc-protobuf"
},
"ranges": [
{
"events": [
{
"introduced": "1.54.0"
},
{
"fixed": "1.54.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "PyPI",
"name": "grpcio"
},
"ranges": [
{
"events": [
{
"introduced": "1.54.0"
},
{
"fixed": "1.54.2"
}
],
"type": "ECOSYSTEM"
}
]
},
{
"package": {
"ecosystem": "RubyGems",
"name": "grpc"
},
"ranges": [
{
"events": [
{
"introduced": "1.54.0"
},
{
"fixed": "1.54.2"
}
],
"type": "ECOSYSTEM"
}
]
}
],
"aliases": [
"CVE-2023-32732"
],
"database_specific": {
"cwe_ids": [
"CWE-440"
],
"github_reviewed": true,
"github_reviewed_at": "2023-07-06T23:56:31Z",
"nvd_published_at": "2023-06-09T11:15:09Z",
"severity": "MODERATE"
},
"details": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0https://github.com/grpc/grpc/pull/32309.",
"id": "GHSA-9hxf-ppjv-w6rq",
"modified": "2025-08-13T15:00:12Z",
"published": "2023-07-06T21:15:08Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2023-32732"
},
{
"type": "WEB",
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"type": "WEB",
"url": "https://github.com/grpc/grpc/commit/29d8beee0ac2555773b2a2dda5601c74a95d6c10"
},
{
"type": "WEB",
"url": "https://github.com/grpc/grpc/commit/65a2a895afaf1d2072447b9baf246374b182a946"
},
{
"type": "WEB",
"url": "https://github.com/grpc/grpc/releases/tag/v1.53.1"
},
{
"type": "WEB",
"url": "https://github.com/grpc/grpc/releases/tag/v1.54.2"
},
{
"type": "WEB",
"url": "https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY"
},
{
"type": "WEB",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"type": "CVSS_V3"
}
],
"summary": "gRPC connection termination issue"
}
CERTFR-2025-AVI-0608
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0 sans les derniers correctifs de sécurité pour les protocoles GoogleCloudPubSub, GoogleCommon et GoogleGSuiteActivityReportsRESTAPI | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP12 IF03 | ||
| IBM | WebSphere | WebSphere Remote Server sans les derniers correctifs de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.4.x antérieures à 6.4.0.2 pour Unix | ||
| IBM | Sterling | Sterling Connect:Direct FTP+ versions 1.3.0 antérieures à 1.3.0.1 | ||
| IBM | Db2 Query Management Facility | Db2 Query Management Facility versions 13.1 et 12.2.0.5 sans le JRE 8.0.8.45 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 pour Unix | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.3 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.7 pour Windows | ||
| IBM | QRadar Incident Forensics | QRadar Incident Forensics versions 7.5.0 antérieures à 7.5.0 UP12 IF03 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions antérieures à 25.0.0.8 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.7.iFix052 pour Unix | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 5 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.0.x antérieures à 9.0.5.25 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x antérieures à 8.6.1.6 sans le correctif PH67142 iFix |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5.0 sans les derniers correctifs de s\u00e9curit\u00e9 pour les protocoles GoogleCloudPubSub, GoogleCommon et GoogleGSuiteActivityReportsRESTAPI",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Remote Server sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.2 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct FTP+ versions 1.3.0 ant\u00e9rieures \u00e0 1.3.0.1",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Query Management Facility versions 13.1 et 12.2.0.5 sans le JRE 8.0.8.45",
"product": {
"name": "Db2 Query Management Facility",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.7 pour Windows",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "QRadar Incident Forensics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions ant\u00e9rieures \u00e0 25.0.0.8",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.7.iFix052 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.0.x ant\u00e9rieures \u00e0 9.0.5.25",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x ant\u00e9rieures \u00e0 8.6.1.6 sans le correctif PH67142 iFix",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2020-4301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4301"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2021-20468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20468"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2021-29823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29823"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2022-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36773"
},
{
"name": "CVE-2021-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-29078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29078"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2021-23438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23438"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2022-30614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30614"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-49395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49395"
},
{
"name": "CVE-2021-44533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44533"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2021-29418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29418"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2021-39045",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39045"
},
{
"name": "CVE-2022-21824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21824"
},
{
"name": "CVE-2022-21803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21803"
},
{
"name": "CVE-2021-39009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39009"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2021-28918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28918"
},
{
"name": "CVE-2025-36038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36038"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0608",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239645",
"url": "https://www.ibm.com/support/pages/node/7239645"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239617",
"url": "https://www.ibm.com/support/pages/node/7239617"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239753",
"url": "https://www.ibm.com/support/pages/node/7239753"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239757",
"url": "https://www.ibm.com/support/pages/node/7239757"
},
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239856",
"url": "https://www.ibm.com/support/pages/node/7239856"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239492",
"url": "https://www.ibm.com/support/pages/node/7239492"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6615285",
"url": "https://www.ibm.com/support/pages/node/6615285"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239816",
"url": "https://www.ibm.com/support/pages/node/7239816"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239564",
"url": "https://www.ibm.com/support/pages/node/7239564"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239627",
"url": "https://www.ibm.com/support/pages/node/7239627"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239598",
"url": "https://www.ibm.com/support/pages/node/7239598"
}
]
}
CERTFR-2025-AVI-1051
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling File Gateway | Sterling File Gateway versions antérieures à 6.2.1.1_1 | ||
| IBM | Db2 | Db2 versions V11.5.x sans le correctif APAR DT433150 | ||
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.13.2 | ||
| IBM | Db2 | Db2 versions V11.1.x sans le correctif APAR DT433150 | ||
| IBM | Db2 | Db2 versions V12.1.3 sans le correctif APAR DT433150 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.21 | ||
| IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de sécurité | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator versions antérieures à 6.2.1.1_1 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.19 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10 antérieures à 14.10.xC11W1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling File Gateway versions ant\u00e9rieures \u00e0 6.2.1.1_1",
"product": {
"name": "Sterling File Gateway",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V11.5.x sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.13.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V11.1.x sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V12.1.3 sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.21",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere Service Registry and Repository",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator versions ant\u00e9rieures \u00e0 6.2.1.1_1",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.19",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 14.10 ant\u00e9rieures \u00e0 14.10.xC11W1",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-58369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58369"
},
{
"name": "CVE-2025-47279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47279"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2018-25031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25031"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2024-45675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45675"
},
{
"name": "CVE-2025-59822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59822"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252704",
"url": "https://www.ibm.com/support/pages/node/7252704"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252903",
"url": "https://www.ibm.com/support/pages/node/7252903"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252597",
"url": "https://www.ibm.com/support/pages/node/7252597"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252211",
"url": "https://www.ibm.com/support/pages/node/7252211"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252908",
"url": "https://www.ibm.com/support/pages/node/7252908"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7250474",
"url": "https://www.ibm.com/support/pages/node/7250474"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252718",
"url": "https://www.ibm.com/support/pages/node/7252718"
}
]
}
CERTFR-2025-AVI-0667
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Secure Analytics. Elle permet à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP12 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2025-33097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33097"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-49395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49395"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0667",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Secure Analytics. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-U12-IF03"
}
]
}
CERTFR-2024-AVI-0297
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Cloud Native Router versions antérieures à 23.4
- cRPD versions antérieures à 23.4R1
- Paragon Active Assurance versions antérieures à 4.2.1
- Paragon Active Assurance versions antérieures à 4.3.0
- Junos OS gamme EX4300 versions antérieures à 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6
- Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions antérieures à 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gammes SRX Branch Series versions antérieures à 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1
- Junos OS gammes MX Series avec SPC3 et MS-MPC versions antérieures à 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gamme SRX 5000 Series avec SPC2 versions antérieures à 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2
- Junos OS gammes MX Series versions antérieures à 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3
- Junos OS gamme EX9200-15C versions antérieures à 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2
- Junos OS gammes SRX4600 versions antérieures à 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2 et 23.4R1
- Junos OS gammes ACX5448 et ACX710 versions antérieures à 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1
- Junos OS versions antérieures à 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2
-
Junos OS Evolved versions antérieures à 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO
| Vendor | Product | Description |
|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eCloud Native Router versions ant\u00e9rieures \u00e0 23.4\u003c/li\u003e \u003cli\u003ecRPD versions ant\u00e9rieures \u00e0 23.4R1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0\u003c/li\u003e \u003cli\u003eJunos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6\u003c/li\u003e \u003cli\u003eJunos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3\u003c/li\u003e \u003cli\u003eJunos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2\u003c/li\u003e \u003cli\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eJunos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e \u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2024-30381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30381"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-30401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30401"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2024-30409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30409"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39975"
},
{
"name": "CVE-2024-30410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30410"
},
{
"name": "CVE-2018-7738",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-30380",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30380"
},
{
"name": "CVE-2023-41913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41913"
},
{
"name": "CVE-2024-30392",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30392"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23240"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2011-1676",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1676"
},
{
"name": "CVE-2020-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8037"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2024-30391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30391"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-30389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30389"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3592"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2021-39534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39534"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30398"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2021-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39531"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2011-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1675"
},
{
"name": "CVE-2023-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28366"
},
{
"name": "CVE-2024-30378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30378"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2021-34434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34434"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2023-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1428"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-30402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30402"
},
{
"name": "CVE-2018-1000215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000215"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2024-30403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30403"
},
{
"name": "CVE-2021-36159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36159"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2021-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30139"
},
{
"name": "CVE-2024-30384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30384"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-30387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30387"
},
{
"name": "CVE-2017-18018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18018"
},
{
"name": "CVE-2024-30406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30406"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-30394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30394"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-30407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30407"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2020-27350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27350"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2021-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39533"
},
{
"name": "CVE-2024-30390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30390"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2023-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0809"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-30388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30388"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2024-30386",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30386"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2011-1677",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1677"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2020-28928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28928"
},
{
"name": "CVE-2021-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41039"
},
{
"name": "CVE-2024-30382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30382"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-40528",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40528"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2024-30405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30405"
},
{
"name": "CVE-2024-30397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30397"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-30395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30395"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0297",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US"
}
]
}
CERTFR-2025-AVI-1051
Vulnerability from certfr_avis - Published: 2025-11-28 - Updated: 2025-11-28
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | Sterling File Gateway | Sterling File Gateway versions antérieures à 6.2.1.1_1 | ||
| IBM | Db2 | Db2 versions V11.5.x sans le correctif APAR DT433150 | ||
| IBM | Spectrum | Spectrum Control versions antérieures à 5.4.13.2 | ||
| IBM | Db2 | Db2 versions V11.1.x sans le correctif APAR DT433150 | ||
| IBM | Db2 | Db2 versions V12.1.3 sans le correctif APAR DT433150 | ||
| IBM | Security QRadar EDR | Security QRadar EDR versions antérieures à 3.12.21 | ||
| IBM | WebSphere Service Registry and Repository | WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de sécurité | ||
| IBM | Sterling B2B Integrator | Sterling B2B Integrator versions antérieures à 6.2.1.1_1 | ||
| IBM | QRadar Deployment Intelligence App | QRadar Deployment Intelligence App versions antérieures à 3.0.19 | ||
| IBM | Informix Dynamic Server | Informix Dynamic Server versions 14.10 antérieures à 14.10.xC11W1 |
| Title | Publication Time | Tags | |||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Sterling File Gateway versions ant\u00e9rieures \u00e0 6.2.1.1_1",
"product": {
"name": "Sterling File Gateway",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V11.5.x sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Spectrum Control versions ant\u00e9rieures \u00e0 5.4.13.2",
"product": {
"name": "Spectrum",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V11.1.x sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 versions V12.1.3 sans le correctif APAR DT433150",
"product": {
"name": "Db2",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Security QRadar EDR versions ant\u00e9rieures \u00e0 3.12.21",
"product": {
"name": "Security QRadar EDR",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Service Registry and Repository versions 8.5 sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere Service Registry and Repository",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling B2B Integrator versions ant\u00e9rieures \u00e0 6.2.1.1_1",
"product": {
"name": "Sterling B2B Integrator",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Deployment Intelligence App versions ant\u00e9rieures \u00e0 3.0.19",
"product": {
"name": "QRadar Deployment Intelligence App",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Informix Dynamic Server versions 14.10 ant\u00e9rieures \u00e0 14.10.xC11W1",
"product": {
"name": "Informix Dynamic Server",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-1370",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1370"
},
{
"name": "CVE-2025-58369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58369"
},
{
"name": "CVE-2025-47279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47279"
},
{
"name": "CVE-2025-7962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7962"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2018-25031",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25031"
},
{
"name": "CVE-2025-7783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7783"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-54121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54121"
},
{
"name": "CVE-2024-45675",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45675"
},
{
"name": "CVE-2025-59822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59822"
},
{
"name": "CVE-2024-56339",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56339"
},
{
"name": "CVE-2025-23184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23184"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-58754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58754"
},
{
"name": "CVE-2024-57699",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57699"
}
],
"initial_release_date": "2025-11-28T00:00:00",
"last_revision_date": "2025-11-28T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1051",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-11-28T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252704",
"url": "https://www.ibm.com/support/pages/node/7252704"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252903",
"url": "https://www.ibm.com/support/pages/node/7252903"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252597",
"url": "https://www.ibm.com/support/pages/node/7252597"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252211",
"url": "https://www.ibm.com/support/pages/node/7252211"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252908",
"url": "https://www.ibm.com/support/pages/node/7252908"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7250474",
"url": "https://www.ibm.com/support/pages/node/7250474"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7252718",
"url": "https://www.ibm.com/support/pages/node/7252718"
}
]
}
CERTFR-2025-AVI-0667
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Secure Analytics. Elle permet à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Secure Analytics | Secure Analytics versions antérieures à 7.5.0 UP12 IF03 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Secure Analytics versions ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "Secure Analytics",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2025-33097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-33097"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-49395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49395"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0667",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-08-08T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Secure Analytics. Elle permet \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Secure Analytics",
"vendor_advisories": [
{
"published_at": "2025-08-07",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA",
"url": "https://supportportal.juniper.net/s/article/On-Demand-JSA-Series-Multiple-vulnerabilities-resolved-in-Juniper-Secure-Analytics-in-7-5-0-U12-IF03"
}
]
}
CERTFR-2024-AVI-0781
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1 | ||
| Juniper Networks | BBE Cloud Setup | BBE Cloudsetup versions antérieures à 2.1.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "BBE Cloudsetup versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "BBE Cloud Setup",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-21618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21618"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-39524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39524"
},
{
"name": "CVE-2020-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15861"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2024-39523",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39523"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2020-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15862"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2019-20892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20892"
},
{
"name": "CVE-2022-4886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4886"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2022-23525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23525"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21605"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2022-23524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23524"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2015-8100",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8100"
},
{
"name": "CVE-2024-21615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21615"
},
{
"name": "CVE-2021-25746",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25746"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2021-25748",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25748"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2022-23526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23526"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2024-21609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21609"
},
{
"name": "CVE-2024-39522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39522"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-39517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39517"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2024-39521",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39521"
},
{
"name": "CVE-2024-39512",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39512"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2021-44225",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44225"
},
{
"name": "CVE-2024-39553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39553"
},
{
"name": "CVE-2024-39520",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39520"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-5043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5043"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2021-25745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25745"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0781",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-16T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75756",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-low-privileged-user-can-access-confidential-information-CVE-2024-21615"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82975",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-CLI-parameter-processing-issues-allowing-privilege-escalation-resolved"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82977",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-User-is-not-logged-out-when-the-console-cable-is-disconnected-CVE-2024-39512"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82971",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-BBE-Cloudsetup-Multiple-vulnerabilities-resolved-in-2-1-0-release"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79175",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Upon-processing-specific-L2-traffic-rpd-can-hang-in-devices-with-EVPN-VXLAN-configured-CVE-2024-39517"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82974",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL-3-0-12"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75746",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-300-Series-Specific-link-local-traffic-causes-a-control-plane-overload-CVE-2024-21605"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75759",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-LLDP-is-enabled-and-a-malformed-LLDP-packet-is-received-l2cpd-crashes-CVE-2024-21618"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75750",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-If-specific-IPsec-parameters-are-negotiated-iked-will-crash-due-to-a-memory-leak-CVE-2024-21609"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79101",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-arbitrary-data-when-sampling-service-is-enabled-leads-to-partial-Denial-of-Service-DoS-CVE-2024-39553"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82973",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-net-SNMP-5-9-4"
}
]
}
CERTFR-2025-AVI-0608
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits IBM. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0 sans les derniers correctifs de sécurité pour les protocoles GoogleCloudPubSub, GoogleCommon et GoogleGSuiteActivityReportsRESTAPI | ||
| IBM | QRadar SIEM | QRadar SIEM versions 7.5.0 antérieures à 7.5.0 UP12 IF03 | ||
| IBM | WebSphere | WebSphere Remote Server sans les derniers correctifs de sécurité | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.4.x antérieures à 6.4.0.2 pour Unix | ||
| IBM | Sterling | Sterling Connect:Direct FTP+ versions 1.3.0 antérieures à 1.3.0.1 | ||
| IBM | Db2 Query Management Facility | Db2 Query Management Facility versions 13.1 et 12.2.0.5 sans le JRE 8.0.8.45 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.3.x antérieures à 6.3.0.5 pour Unix | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.2.x antérieures à 11.2.3 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.7 pour Windows | ||
| IBM | QRadar Incident Forensics | QRadar Incident Forensics versions 7.5.0 antérieures à 7.5.0 UP12 IF03 | ||
| IBM | WebSphere | WebSphere Application Server Liberty versions antérieures à 25.0.0.8 | ||
| IBM | Sterling Connect:Direct | Sterling Connect:Direct versions 6.2.x antérieures à 6.2.0.7.iFix052 pour Unix | ||
| IBM | Cognos Analytics | Cognos Analytics versions 11.1.x antérieures à 11.1.7 Fix Pack 5 | ||
| IBM | WebSphere | WebSphere Application Server versions 9.0.0.x antérieures à 9.0.5.25 | ||
| IBM | WebSphere | WebSphere eXtreme Scale versions 8.6.1.x antérieures à 8.6.1.6 sans le correctif PH67142 iFix |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QRadar SIEM versions 7.5.0 sans les derniers correctifs de s\u00e9curit\u00e9 pour les protocoles GoogleCloudPubSub, GoogleCommon et GoogleGSuiteActivityReportsRESTAPI",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar SIEM versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "QRadar SIEM",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Remote Server sans les derniers correctifs de s\u00e9curit\u00e9",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.4.x ant\u00e9rieures \u00e0 6.4.0.2 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct FTP+ versions 1.3.0 ant\u00e9rieures \u00e0 1.3.0.1",
"product": {
"name": "Sterling",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Db2 Query Management Facility versions 13.1 et 12.2.0.5 sans le JRE 8.0.8.45",
"product": {
"name": "Db2 Query Management Facility",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.3.x ant\u00e9rieures \u00e0 6.3.0.5 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.2.x ant\u00e9rieures \u00e0 11.2.3",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.7 pour Windows",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "QRadar Incident Forensics versions 7.5.0 ant\u00e9rieures \u00e0 7.5.0 UP12 IF03",
"product": {
"name": "QRadar Incident Forensics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server Liberty versions ant\u00e9rieures \u00e0 25.0.0.8",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Sterling Connect:Direct versions 6.2.x ant\u00e9rieures \u00e0 6.2.0.7.iFix052 pour Unix",
"product": {
"name": "Sterling Connect:Direct",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "Cognos Analytics versions 11.1.x ant\u00e9rieures \u00e0 11.1.7 Fix Pack 5",
"product": {
"name": "Cognos Analytics",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere Application Server versions 9.0.0.x ant\u00e9rieures \u00e0 9.0.5.25",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
},
{
"description": "WebSphere eXtreme Scale versions 8.6.1.x ant\u00e9rieures \u00e0 8.6.1.6 sans le correctif PH67142 iFix",
"product": {
"name": "WebSphere",
"vendor": {
"name": "IBM",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4447"
},
{
"name": "CVE-2020-4301",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-4301"
},
{
"name": "CVE-2024-52005",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52005"
},
{
"name": "CVE-2021-20468",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20468"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2025-49125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49125"
},
{
"name": "CVE-2021-29823",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29823"
},
{
"name": "CVE-2021-44532",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44532"
},
{
"name": "CVE-2025-36097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36097"
},
{
"name": "CVE-2022-36773",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36773"
},
{
"name": "CVE-2021-3807",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3807"
},
{
"name": "CVE-2025-48976",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48976"
},
{
"name": "CVE-2025-21587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21587"
},
{
"name": "CVE-2022-29078",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29078"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2021-23438",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23438"
},
{
"name": "CVE-2021-43797",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43797"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2025-48988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48988"
},
{
"name": "CVE-2022-30614",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-30614"
},
{
"name": "CVE-2025-30698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30698"
},
{
"name": "CVE-2022-49395",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49395"
},
{
"name": "CVE-2021-44533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44533"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2021-29418",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29418"
},
{
"name": "CVE-2020-36518",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36518"
},
{
"name": "CVE-2021-39045",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39045"
},
{
"name": "CVE-2022-21824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21824"
},
{
"name": "CVE-2022-21803",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-21803"
},
{
"name": "CVE-2021-39009",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39009"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2020-16156",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16156"
},
{
"name": "CVE-2025-2900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-2900"
},
{
"name": "CVE-2025-5283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5283"
},
{
"name": "CVE-2021-44531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44531"
},
{
"name": "CVE-2021-28918",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28918"
},
{
"name": "CVE-2025-36038",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-36038"
},
{
"name": "CVE-2020-28469",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28469"
},
{
"name": "CVE-2021-3749",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3749"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
}
],
"links": [],
"reference": "CERTFR-2025-AVI-0608",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-07-18T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Injection de requ\u00eates ill\u00e9gitimes par rebond (CSRF)"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Falsification de requ\u00eates c\u00f4t\u00e9 serveur (SSRF)"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits IBM. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits IBM",
"vendor_advisories": [
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239645",
"url": "https://www.ibm.com/support/pages/node/7239645"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239617",
"url": "https://www.ibm.com/support/pages/node/7239617"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239753",
"url": "https://www.ibm.com/support/pages/node/7239753"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239757",
"url": "https://www.ibm.com/support/pages/node/7239757"
},
{
"published_at": "2025-07-16",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239856",
"url": "https://www.ibm.com/support/pages/node/7239856"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239492",
"url": "https://www.ibm.com/support/pages/node/7239492"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 6615285",
"url": "https://www.ibm.com/support/pages/node/6615285"
},
{
"published_at": "2025-07-15",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239816",
"url": "https://www.ibm.com/support/pages/node/7239816"
},
{
"published_at": "2025-07-11",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239564",
"url": "https://www.ibm.com/support/pages/node/7239564"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239627",
"url": "https://www.ibm.com/support/pages/node/7239627"
},
{
"published_at": "2025-07-14",
"title": "Bulletin de s\u00e9curit\u00e9 IBM 7239598",
"url": "https://www.ibm.com/support/pages/node/7239598"
}
]
}
CERTFR-2024-AVI-0297
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper. Certaines d'entre elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur, une exécution de code arbitraire à distance et un déni de service à distance.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
- Cloud Native Router versions antérieures à 23.4
- cRPD versions antérieures à 23.4R1
- Paragon Active Assurance versions antérieures à 4.2.1
- Paragon Active Assurance versions antérieures à 4.3.0
- Junos OS gamme EX4300 versions antérieures à 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6
- Junos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions antérieures à 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gammes SRX Branch Series versions antérieures à 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1
- Junos OS gammes MX Series avec SPC3 et MS-MPC versions antérieures à 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1
- Junos OS gamme SRX 5000 Series avec SPC2 versions antérieures à 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2
- Junos OS gammes MX Series versions antérieures à 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3
- Junos OS gamme EX9200-15C versions antérieures à 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2
- Junos OS gammes SRX4600 versions antérieures à 21.2R3-S7, 21.4R3-S6, 22.1R3-S5, 22.2R3-S3, 22.3R3-S2, 22.4R3, 23.2R1-S2, 23.2R2 et 23.4R1
- Junos OS gammes ACX5448 et ACX710 versions antérieures à 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1
- Junos OS versions antérieures à 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2
-
Junos OS Evolved versions antérieures à 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cul\u003e \u003cli\u003eCloud Native Router versions ant\u00e9rieures \u00e0 23.4\u003c/li\u003e \u003cli\u003ecRPD versions ant\u00e9rieures \u00e0 23.4R1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.2.1\u003c/li\u003e \u003cli\u003eParagon Active Assurance versions ant\u00e9rieures \u00e0 4.3.0\u003c/li\u003e \u003cli\u003eJunos OS gamme EX4300 versions ant\u00e9rieures \u00e0 20.4R3-S10, 21.2R3-S7 et 21.4R3-S6\u003c/li\u003e \u003cli\u003eJunos OS gammes QFX5000 Series, EX4400 Series, EX4100 Series et EX4650 Series versions ant\u00e9rieures \u00e0 20.4R3-S8, 21.2R3-S6, 21.3R3-S5, 21.4R3-S4, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes SRX Branch Series versions ant\u00e9rieures \u00e0 21.1R3-S5, 21.2R3-S5, 21.3R3-S4, 21.4R3-S3, 22.1R3-S2, 22.2R2-S2, 22.2R3, 22.3R2-S1, 22.3R3, 22.4R1-S2, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gammes MX Series avec SPC3 et MS-MPC versions ant\u00e9rieures \u00e0 21.2R3-S6, 21.3R3-S5, 21.4R3-S5, 22.1R3-S3, 22.2R3-S1, 22.3R2-S2, 22.3R3, 22.4R2-S1, 22.4R3 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS gamme SRX 5000 Series avec SPC2 versions ant\u00e9rieures \u00e0 21.2R3-S7, 21.4, 22.1, 22.2, 22.3, 22.4 et 23.2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0MX Series versions ant\u00e9rieures \u00e0 20.4R3-S5, 21.1, 21.2R3-S1, 21.3, 21.4R3, 22.1R2, 22.2R2 et 22.3\u003c/li\u003e \u003cli\u003eJunos OS gamme EX9200-15C versions ant\u00e9rieures \u00e0 21.2R3-S1, 21.4R3, 22.1R2 et 22.2R2\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0SRX4600 versions ant\u00e9rieures \u00e0 21.2R3-S7,\u00a021.4R3-S6,\u00a022.1R3-S5,\u00a022.2R3-S3,\u00a022.3R3-S2,\u00a022.4R3,\u00a023.2R1-S2, 23.2R2 et 23.4R1\u003c/li\u003e \u003cli\u003eJunos OS gammes\u00a0ACX5448 et ACX710 versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S5, 21.3R3-S5, 21.4R3-S4, 22.1R3-S2, 22.2R3-S2, 22.3R2-S2, 22.3R3, 22.4R2 et 23.2R1\u003c/li\u003e \u003cli\u003eJunos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.1R3, 21.2R3-S7, 21.3R3-S5, 21.4R3-S5, 22.1R3-S4, 22.2R3-S2, 22.3R3-S2, 22.4R3 et 23.4R2\u003c/li\u003e \u003cli\u003e \u003cdiv\u003e \u003cdiv\u003e \u003cp\u003eJunos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S9-EVO, 21.2R3-S7-EVO, 21.3R3-S5-EVO, 21.4R3-S6-EVO, 22.1R3-S4-EVO, 22.2R3-S2-EVO, 22.3R3-S2-EVO, 22.4R3-EVO, 23.2R2-EVO et 23.4R1-EVO\u003c/p\u003e \u003c/div\u003e \u003c/div\u003e \u003c/li\u003e \u003c/ul\u003e ",
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2023-40217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40217"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2021-37600",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37600"
},
{
"name": "CVE-2024-30381",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30381"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2020-1747",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1747"
},
{
"name": "CVE-2024-30401",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30401"
},
{
"name": "CVE-2021-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28831"
},
{
"name": "CVE-2024-30409",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30409"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2020-14343",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14343"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2023-39975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39975"
},
{
"name": "CVE-2024-30410",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30410"
},
{
"name": "CVE-2018-7738",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7738"
},
{
"name": "CVE-2022-48522",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48522"
},
{
"name": "CVE-2020-8285",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8285"
},
{
"name": "CVE-2021-28957",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-28957"
},
{
"name": "CVE-2024-30380",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30380"
},
{
"name": "CVE-2023-41913",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41913"
},
{
"name": "CVE-2024-30392",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30392"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2021-23240",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-23240"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2011-1676",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1676"
},
{
"name": "CVE-2020-8037",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8037"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2020-19190",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19190"
},
{
"name": "CVE-2024-30391",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30391"
},
{
"name": "CVE-2020-8286",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8286"
},
{
"name": "CVE-2023-2253",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2253"
},
{
"name": "CVE-2023-44487",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-44487"
},
{
"name": "CVE-2024-30389",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30389"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2023-3592",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3592"
},
{
"name": "CVE-2020-19187",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19187"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2019-9923",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9923"
},
{
"name": "CVE-2021-39534",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39534"
},
{
"name": "CVE-2023-5981",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5981"
},
{
"name": "CVE-2023-27043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27043"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2024-30398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30398"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2023-48795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-48795"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2020-19188",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19188"
},
{
"name": "CVE-2020-19186",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19186"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2020-25659",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25659"
},
{
"name": "CVE-2021-39531",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39531"
},
{
"name": "CVE-2020-8284",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8284"
},
{
"name": "CVE-2023-23915",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23915"
},
{
"name": "CVE-2011-1675",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1675"
},
{
"name": "CVE-2023-28366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28366"
},
{
"name": "CVE-2024-30378",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30378"
},
{
"name": "CVE-2023-23931",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23931"
},
{
"name": "CVE-2021-34434",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-34434"
},
{
"name": "CVE-2016-10009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10009"
},
{
"name": "CVE-2023-1428",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1428"
},
{
"name": "CVE-2023-3978",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3978"
},
{
"name": "CVE-2024-30402",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30402"
},
{
"name": "CVE-2018-1000215",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000215"
},
{
"name": "CVE-2023-23914",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23914"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2024-30403",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30403"
},
{
"name": "CVE-2021-36159",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36159"
},
{
"name": "CVE-2018-1000654",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000654"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2022-2795",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2795"
},
{
"name": "CVE-2021-30139",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30139"
},
{
"name": "CVE-2024-30384",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30384"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2024-30387",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30387"
},
{
"name": "CVE-2017-18018",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18018"
},
{
"name": "CVE-2024-30406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30406"
},
{
"name": "CVE-2023-43804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-43804"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-30394",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30394"
},
{
"name": "CVE-2023-2650",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2650"
},
{
"name": "CVE-2022-3996",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3996"
},
{
"name": "CVE-2024-30407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30407"
},
{
"name": "CVE-2020-36242",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-36242"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2023-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38408"
},
{
"name": "CVE-2020-27350",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27350"
},
{
"name": "CVE-2023-36054",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36054"
},
{
"name": "CVE-2021-39533",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39533"
},
{
"name": "CVE-2024-30390",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30390"
},
{
"name": "CVE-2020-19185",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19185"
},
{
"name": "CVE-2023-0809",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0809"
},
{
"name": "CVE-2021-20193",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20193"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2016-2781",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2781"
},
{
"name": "CVE-2020-19189",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19189"
},
{
"name": "CVE-2023-32731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32731"
},
{
"name": "CVE-2023-49083",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-49083"
},
{
"name": "CVE-2024-30388",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30388"
},
{
"name": "CVE-2019-18276",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18276"
},
{
"name": "CVE-2024-30386",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30386"
},
{
"name": "CVE-2021-33560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33560"
},
{
"name": "CVE-2011-1677",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1677"
},
{
"name": "CVE-2018-20225",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20225"
},
{
"name": "CVE-2020-28928",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28928"
},
{
"name": "CVE-2021-41039",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-41039"
},
{
"name": "CVE-2024-30382",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30382"
},
{
"name": "CVE-2018-20482",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20482"
},
{
"name": "CVE-2021-40528",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-40528"
},
{
"name": "CVE-2023-32681",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32681"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2020-28493",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-28493"
},
{
"name": "CVE-2020-27783",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27783"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2011-1089",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1089"
},
{
"name": "CVE-2024-30405",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30405"
},
{
"name": "CVE-2024-30397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30397"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2024-30395",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-30395"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0297",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-04-11T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
},
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper. Certaines\nd\u0027entre elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur, une ex\u00e9cution de code arbitraire \u00e0\ndistance et un d\u00e9ni de service \u00e0 distance.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79102 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-libslax-Multiple-vulnerabilities-in-libslax-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79106 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Juniper-Cloud-Native-Router-Multiple-vulnerabilities-resolved-in-23-4-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79181 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-When-MAC-learning-happens-and-an-interface-gets-flapped-the-PFE-crashes-CVE-2024-30403?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79186 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-If-a-specific-CLI-command-is-issued-PFE-crashes-will-occur-CVE-2024-30384?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79089 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-QFX5000-Series-and-EX-Series-Specific-malformed-LACP-packets-will-cause-flaps-CVE-2024-30388?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79173 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Paragon-Active-Assurance-probe-serviced-exposes-internal-objects-to-local-users-CVE-2024-30381?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79104 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-ACX-Series-with-Paragon-Active-Assurance-Test-Agent-A-local-high-privileged-attacker-can-recover-other-administrators-credentials-CVE-2024-30406?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79094 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-A-specific-EVPN-type-5-route-causes-rpd-crash-CVE-2024-30394?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79183 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-Evolved-Connection-limits-is-not-being-enforced-while-the-resp-rate-limit-is-being-enforced-CVE-2024-30390?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79176 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX4600-Series-A-high-amount-of-specific-traffic-causes-packet-drops-and-an-eventual-PFE-crash-CVE-2024-30398?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79179 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-An-invalid-certificate-causes-a-Denial-of-Service-in-the-Internet-Key-Exchange-IKE-process-CVE-2024-30397?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79187 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-ACX5448-ACX710-Due-to-the-interface-flaps-the-PFE-process-can-crash-CVE-2024-30387?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79109 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-bbe-smgd-process-crash-upon-execution-of-specific-CLI-commands-CVE-2024-30378?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79171 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-l2cpd-crash-upon-receipt-of-a-specific-TLV-CVE-2024-30380?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79188 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-When-IPsec-authentication-is-configured-with-hmac-sha-384-and-hmac-sha-512-no-authentication-of-traffic-is-performed-CVE-2024-30391?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79099 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Higher-CPU-consumption-on-routing-engine-leads-to-Denial-of-Service-DoS-CVE-2024-30409?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79184 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-In-a-EVPN-VXLAN-scenario-state-changes-on-adjacent-systems-can-cause-an-l2ald-process-crash-CVE-2024-30386?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79110 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-and-EX9200-15C-Stack-based-buffer-overflow-in-aftman-CVE-2024-30401?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79174 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Junos-OS-and-Junos-OS-Evolved-RPD-crash-when-CoS-based-forwarding-CBF-policy-is-configured-CVE-2024-30382?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79095 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-malformed-BGP-tunnel-encapsulation-attribute-will-lead-to-an-rpd-crash-CVE-2024-30395?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79100 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Loopback-filter-not-blocking-traffic-despite-having-discard-term-CVE-2024-30410?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79107 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-cRPD-Multiple-vulnerabilities-resolved-in-23-4R1-release?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79092 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-MS-MPC-MIC-When-URL-filtering-is-enabled-and-a-specific-URL-request-is-received-a-flowd-crash-occurs-CVE-2024-30392?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79185 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-EX4300-Series-Firewall-filter-not-blocking-egress-traffic-CVE-2024-30389?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79108 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-cURL-vulnerabilities-resolved?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79091 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-Branch-Series-When-DNS-proxy-is-configured-and-specific-DNS-queries-are-received-resolver-s-performance-is-degraded-CVE-2022-2795?language=en_US"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA79180 du 10 avril 2024",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-The-l2ald-crashes-on-receiving-telemetry-messages-from-a-specific-subscription-CVE-2024-30402?language=en_US"
}
]
}
CERTFR-2024-AVI-0781
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans les produits Juniper Networks. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, une élévation de privilèges et un déni de service à distance.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos OS Evolved | Junos OS Evolved versions antérieures à 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO | ||
| Juniper Networks | Junos OS | Junos OS versions antérieures à 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1 | ||
| Juniper Networks | BBE Cloud Setup | BBE Cloudsetup versions antérieures à 2.1.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Junos OS Evolved versions ant\u00e9rieures \u00e0 20.4R3-S7-EVO, 21.2R3-S7-EVO, 21.2R3-S8-EVO, 21.3R3-S5-EVO, 21.4R3-S5-EVO, 21.4R3-S7-EVO, 22.1R3-S4-EVO, 22.1R3-S5-EVO, 22.2R3-EVO, 22.2R3-S2-EVO, 22.2R3-S3-EVO, 22.2R3-S4-EVO, 22.3R2-EVO, 22.3R2-S2-EVO, 22.3R3-S1-EVO, 22.3R3-S2-EVO, 22.3R3-S3-EVO, 22.4R2-EVO, 22.4R3-EVO, 22.4R3-S1-EVO, 22.4R3-S2-EVO, 23.2R1-EVO, 23.2R1-S2-EVO, 23.2R2-EVO, 23.2R2-S1-EVO, 23.4R1-EVO, 23.4R1-S1-EVO, 23.4R2-EVO et 24.2R1-EVO",
"product": {
"name": "Junos OS Evolved",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "Junos OS versions ant\u00e9rieures \u00e0 20.4R3-S9, 21.2R3-S6, 21.2R3-S7, 21.2R3-S8, 21.3R3-S5, 21.4R3-S4, 21.4R3-S5, 21.4R3-S7, 22.1R3-S3, 22.1R3-S4, 22.1R3-S5, 22.2R3-S2, 22.2R3-S3, 22.2R3-S4, 22.3R2-S2, 22.3R3, 22.3R3-S1, 22.3R3-S2, 22.3R3-S3, 22.4R2-S2, 22.4R3, 22.4R3-S2, 23.2R1-S1, 23.2R1-S2, 23.2R2, 23.4R1, 23.4R1-S1, 23.4R2 et 24.2R1",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
},
{
"description": "BBE Cloudsetup versions ant\u00e9rieures \u00e0 2.1.0",
"product": {
"name": "BBE Cloud Setup",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2023-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0216"
},
{
"name": "CVE-2024-21618",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21618"
},
{
"name": "CVE-2023-0401",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0401"
},
{
"name": "CVE-2023-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28841"
},
{
"name": "CVE-2023-28840",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28840"
},
{
"name": "CVE-2022-4304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4304"
},
{
"name": "CVE-2024-39524",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39524"
},
{
"name": "CVE-2020-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15861"
},
{
"name": "CVE-2015-5621",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5621"
},
{
"name": "CVE-2023-3817",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3817"
},
{
"name": "CVE-2014-2310",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2310"
},
{
"name": "CVE-2024-39523",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39523"
},
{
"name": "CVE-2023-0215",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0215"
},
{
"name": "CVE-2023-0286",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0286"
},
{
"name": "CVE-2020-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15862"
},
{
"name": "CVE-2023-4807",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4807"
},
{
"name": "CVE-2019-20892",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20892"
},
{
"name": "CVE-2022-4886",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4886"
},
{
"name": "CVE-2023-5363",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5363"
},
{
"name": "CVE-2022-23525",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23525"
},
{
"name": "CVE-2007-5846",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-5846"
},
{
"name": "CVE-2023-0466",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0466"
},
{
"name": "CVE-2024-21605",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21605"
},
{
"name": "CVE-2023-0465",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0465"
},
{
"name": "CVE-2022-4203",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4203"
},
{
"name": "CVE-2022-23524",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23524"
},
{
"name": "CVE-2023-0217",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0217"
},
{
"name": "CVE-2015-8100",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8100"
},
{
"name": "CVE-2024-21615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21615"
},
{
"name": "CVE-2021-25746",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25746"
},
{
"name": "CVE-2023-0464",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0464"
},
{
"name": "CVE-2008-6123",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-6123"
},
{
"name": "CVE-2023-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28842"
},
{
"name": "CVE-2021-25748",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25748"
},
{
"name": "CVE-2023-25173",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25173"
},
{
"name": "CVE-2023-33953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33953"
},
{
"name": "CVE-2022-23526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23526"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2024-21609",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21609"
},
{
"name": "CVE-2024-39522",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39522"
},
{
"name": "CVE-2023-25153",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25153"
},
{
"name": "CVE-2022-4450",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4450"
},
{
"name": "CVE-2023-32732",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32732"
},
{
"name": "CVE-2024-39517",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39517"
},
{
"name": "CVE-2023-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4785"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2024-39521",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39521"
},
{
"name": "CVE-2024-39512",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39512"
},
{
"name": "CVE-2023-1255",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1255"
},
{
"name": "CVE-2021-44225",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-44225"
},
{
"name": "CVE-2024-39553",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39553"
},
{
"name": "CVE-2024-39520",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-39520"
},
{
"name": "CVE-2022-23471",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23471"
},
{
"name": "CVE-2014-3565",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3565"
},
{
"name": "CVE-2023-2975",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2975"
},
{
"name": "CVE-2023-5043",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5043"
},
{
"name": "CVE-2023-3446",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3446"
},
{
"name": "CVE-2021-25745",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-25745"
},
{
"name": "CVE-2018-18065",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18065"
}
],
"links": [],
"reference": "CERTFR-2024-AVI-0781",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2024-09-16T00:00:00.000000"
},
{
"description": "Correction d\u0027identifiants CVE erron\u00e9s",
"revision_date": "2024-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Juniper Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire, une \u00e9l\u00e9vation de privil\u00e8ges et un d\u00e9ni de service \u00e0 distance.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper Networks",
"vendor_advisories": [
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75756",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-A-low-privileged-user-can-access-confidential-information-CVE-2024-21615"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82975",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-CLI-parameter-processing-issues-allowing-privilege-escalation-resolved"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82977",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-User-is-not-logged-out-when-the-console-cable-is-disconnected-CVE-2024-39512"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82971",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-BBE-Cloudsetup-Multiple-vulnerabilities-resolved-in-2-1-0-release"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79175",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Upon-processing-specific-L2-traffic-rpd-can-hang-in-devices-with-EVPN-VXLAN-configured-CVE-2024-39517"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82974",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-OpenSSL-3-0-12"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75746",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-SRX-300-Series-Specific-link-local-traffic-causes-a-control-plane-overload-CVE-2024-21605"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75759",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-LLDP-is-enabled-and-a-malformed-LLDP-packet-is-received-l2cpd-crashes-CVE-2024-21618"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA75750",
"url": "https://supportportal.juniper.net/s/article/2024-04-Security-Bulletin-Junos-OS-MX-Series-with-SPC3-and-SRX-Series-If-specific-IPsec-parameters-are-negotiated-iked-will-crash-due-to-a-memory-leak-CVE-2024-21609"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA79101",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-Evolved-Receipt-of-arbitrary-data-when-sampling-service-is-enabled-leads-to-partial-Denial-of-Service-DoS-CVE-2024-39553"
},
{
"published_at": "2024-09-13",
"title": "Bulletin de s\u00e9curit\u00e9 Juniper Networks JSA82973",
"url": "https://supportportal.juniper.net/s/article/2024-07-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Multiple-vulnerabilities-resolved-in-net-SNMP-5-9-4"
}
]
}
MSRC_CVE-2023-32732
Vulnerability from csaf_microsoft - Published: 2023-06-01 07:00 - Updated: 2026-02-18 03:12| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32732 Denial-of-Service in gRPC - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-32732.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "Denial-of-Service in gRPC",
"tracking": {
"current_release_date": "2026-02-18T03:12:57.000Z",
"generator": {
"date": "2026-02-18T12:06:38.405Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2023-32732",
"initial_release_date": "2023-06-01T07:00:00.000Z",
"revision_history": [
{
"date": "2024-06-30T07:00:00.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2026-02-18T03:12:57.000Z",
"legacy_version": "1.1",
"number": "2",
"summary": "Information published."
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
},
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"category": "product_name",
"name": "azl3 grpc 1.42.0-7",
"product": {
"name": "azl3 grpc 1.42.0-7",
"product_id": "1"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "5"
}
},
{
"category": "product_name",
"name": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "cbl2 python-tensorboard 2.11.0-3",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "azl3 python-tensorboard 2.16.2-6",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "4"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 grpc 1.42.0-7 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-5"
},
"product_reference": "5",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 python-tensorboard 2.11.0-3 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 python-tensorboard 2.16.2-6 as a component of Azure Linux 3.0",
"product_id": "17084-3"
},
"product_reference": "3",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-4"
},
"product_reference": "4",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32732",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17084-5",
"17086-2",
"17084-3",
"17086-4"
]
},
{
"label": "vulnerable_code_not_present",
"product_ids": [
"17084-1"
]
}
],
"notes": [
{
"category": "general",
"text": "Google",
"title": "Assigning CNA"
}
],
"product_status": {
"known_not_affected": [
"17084-1",
"17084-5",
"17086-2",
"17084-3",
"17086-4"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32732 Denial-of-Service in gRPC - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2023/msrc_cve-2023-32732.json"
}
],
"title": "Denial-of-Service in gRPC"
}
]
}
OPENSUSE-SU-2024:13634-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "python310-grpcio-1.60.0-2.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the python310-grpcio-1.60.0-2.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13634",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13634-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32731 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4785 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4785/"
}
],
"title": "python310-grpcio-1.60.0-2.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13634-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "python310-grpcio-1.60.0-2.1.aarch64",
"product": {
"name": "python310-grpcio-1.60.0-2.1.aarch64",
"product_id": "python310-grpcio-1.60.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-2.1.aarch64",
"product": {
"name": "python311-grpcio-1.60.0-2.1.aarch64",
"product_id": "python311-grpcio-1.60.0-2.1.aarch64"
}
},
{
"category": "product_version",
"name": "python39-grpcio-1.60.0-2.1.aarch64",
"product": {
"name": "python39-grpcio-1.60.0-2.1.aarch64",
"product_id": "python39-grpcio-1.60.0-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-grpcio-1.60.0-2.1.ppc64le",
"product": {
"name": "python310-grpcio-1.60.0-2.1.ppc64le",
"product_id": "python310-grpcio-1.60.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-2.1.ppc64le",
"product": {
"name": "python311-grpcio-1.60.0-2.1.ppc64le",
"product_id": "python311-grpcio-1.60.0-2.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python39-grpcio-1.60.0-2.1.ppc64le",
"product": {
"name": "python39-grpcio-1.60.0-2.1.ppc64le",
"product_id": "python39-grpcio-1.60.0-2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-grpcio-1.60.0-2.1.s390x",
"product": {
"name": "python310-grpcio-1.60.0-2.1.s390x",
"product_id": "python310-grpcio-1.60.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-2.1.s390x",
"product": {
"name": "python311-grpcio-1.60.0-2.1.s390x",
"product_id": "python311-grpcio-1.60.0-2.1.s390x"
}
},
{
"category": "product_version",
"name": "python39-grpcio-1.60.0-2.1.s390x",
"product": {
"name": "python39-grpcio-1.60.0-2.1.s390x",
"product_id": "python39-grpcio-1.60.0-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "python310-grpcio-1.60.0-2.1.x86_64",
"product": {
"name": "python310-grpcio-1.60.0-2.1.x86_64",
"product_id": "python310-grpcio-1.60.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-2.1.x86_64",
"product": {
"name": "python311-grpcio-1.60.0-2.1.x86_64",
"product_id": "python311-grpcio-1.60.0-2.1.x86_64"
}
},
{
"category": "product_version",
"name": "python39-grpcio-1.60.0-2.1.x86_64",
"product": {
"name": "python39-grpcio-1.60.0-2.1.x86_64",
"product_id": "python39-grpcio-1.60.0-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-grpcio-1.60.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64"
},
"product_reference": "python310-grpcio-1.60.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-grpcio-1.60.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le"
},
"product_reference": "python310-grpcio-1.60.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-grpcio-1.60.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x"
},
"product_reference": "python310-grpcio-1.60.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python310-grpcio-1.60.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64"
},
"product_reference": "python310-grpcio-1.60.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64"
},
"product_reference": "python311-grpcio-1.60.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le"
},
"product_reference": "python311-grpcio-1.60.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x"
},
"product_reference": "python311-grpcio-1.60.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64"
},
"product_reference": "python311-grpcio-1.60.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-grpcio-1.60.0-2.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64"
},
"product_reference": "python39-grpcio-1.60.0-2.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-grpcio-1.60.0-2.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le"
},
"product_reference": "python39-grpcio-1.60.0-2.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-grpcio-1.60.0-2.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x"
},
"product_reference": "python39-grpcio-1.60.0-2.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python39-grpcio-1.60.0-2.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
},
"product_reference": "python39-grpcio-1.60.0-2.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32731"
}
],
"notes": [
{
"category": "general",
"text": "When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 \n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32731",
"url": "https://www.suse.com/security/cve/CVE-2023-32731"
},
{
"category": "external",
"summary": "SUSE Bug 1212180 for CVE-2023-32731",
"url": "https://bugzilla.suse.com/1212180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-32731"
},
{
"cve": "CVE-2023-32732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32732"
}
],
"notes": [
{
"category": "general",
"text": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32732",
"url": "https://www.suse.com/security/cve/CVE-2023-32732"
},
{
"category": "external",
"summary": "SUSE Bug 1212182 for CVE-2023-32732",
"url": "https://bugzilla.suse.com/1212182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-4785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4785"
}
],
"notes": [
{
"category": "general",
"text": "Lack of error handling in the TCP server in Google\u0027s gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. ",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4785",
"url": "https://www.suse.com/security/cve/CVE-2023-4785"
},
{
"category": "external",
"summary": "SUSE Bug 1215334 for CVE-2023-4785",
"url": "https://bugzilla.suse.com/1215334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python310-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python311-grpcio-1.60.0-2.1.x86_64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.aarch64",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.ppc64le",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.s390x",
"openSUSE Tumbleweed:python39-grpcio-1.60.0-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4785"
}
]
}
OPENSUSE-SU-2024:13621-1
Vulnerability from csaf_opensuse - Published: 2024-06-15 00:00 - Updated: 2024-06-15 00:00| URL | Category | ||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "grpc-devel-1.60.0-3.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the grpc-devel-1.60.0-3.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2024-13621",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_13621-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32731 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4785 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4785/"
}
],
"title": "grpc-devel-1.60.0-3.1 on GA media",
"tracking": {
"current_release_date": "2024-06-15T00:00:00Z",
"generator": {
"date": "2024-06-15T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2024:13621-1",
"initial_release_date": "2024-06-15T00:00:00Z",
"revision_history": [
{
"date": "2024-06-15T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "grpc-devel-1.60.0-3.1.aarch64",
"product": {
"name": "grpc-devel-1.60.0-3.1.aarch64",
"product_id": "grpc-devel-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "grpc-source-1.60.0-3.1.aarch64",
"product": {
"name": "grpc-source-1.60.0-3.1.aarch64",
"product_id": "grpc-source-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-3.1.aarch64",
"product": {
"name": "libgrpc++1_60-1.60.0-3.1.aarch64",
"product_id": "libgrpc++1_60-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-3.1.aarch64",
"product": {
"name": "libgrpc1_60-1.60.0-3.1.aarch64",
"product_id": "libgrpc1_60-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-3.1.aarch64",
"product": {
"name": "libgrpc37-1.60.0-3.1.aarch64",
"product_id": "libgrpc37-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-3.1.aarch64",
"product": {
"name": "libupb37-1.60.0-3.1.aarch64",
"product_id": "libupb37-1.60.0-3.1.aarch64"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-3.1.aarch64",
"product": {
"name": "upb-devel-1.60.0-3.1.aarch64",
"product_id": "upb-devel-1.60.0-3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "grpc-devel-1.60.0-3.1.ppc64le",
"product": {
"name": "grpc-devel-1.60.0-3.1.ppc64le",
"product_id": "grpc-devel-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grpc-source-1.60.0-3.1.ppc64le",
"product": {
"name": "grpc-source-1.60.0-3.1.ppc64le",
"product_id": "grpc-source-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-3.1.ppc64le",
"product": {
"name": "libgrpc++1_60-1.60.0-3.1.ppc64le",
"product_id": "libgrpc++1_60-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-3.1.ppc64le",
"product": {
"name": "libgrpc1_60-1.60.0-3.1.ppc64le",
"product_id": "libgrpc1_60-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-3.1.ppc64le",
"product": {
"name": "libgrpc37-1.60.0-3.1.ppc64le",
"product_id": "libgrpc37-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-3.1.ppc64le",
"product": {
"name": "libupb37-1.60.0-3.1.ppc64le",
"product_id": "libupb37-1.60.0-3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-3.1.ppc64le",
"product": {
"name": "upb-devel-1.60.0-3.1.ppc64le",
"product_id": "upb-devel-1.60.0-3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "grpc-devel-1.60.0-3.1.s390x",
"product": {
"name": "grpc-devel-1.60.0-3.1.s390x",
"product_id": "grpc-devel-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "grpc-source-1.60.0-3.1.s390x",
"product": {
"name": "grpc-source-1.60.0-3.1.s390x",
"product_id": "grpc-source-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-3.1.s390x",
"product": {
"name": "libgrpc++1_60-1.60.0-3.1.s390x",
"product_id": "libgrpc++1_60-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-3.1.s390x",
"product": {
"name": "libgrpc1_60-1.60.0-3.1.s390x",
"product_id": "libgrpc1_60-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-3.1.s390x",
"product": {
"name": "libgrpc37-1.60.0-3.1.s390x",
"product_id": "libgrpc37-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-3.1.s390x",
"product": {
"name": "libupb37-1.60.0-3.1.s390x",
"product_id": "libupb37-1.60.0-3.1.s390x"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-3.1.s390x",
"product": {
"name": "upb-devel-1.60.0-3.1.s390x",
"product_id": "upb-devel-1.60.0-3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "grpc-devel-1.60.0-3.1.x86_64",
"product": {
"name": "grpc-devel-1.60.0-3.1.x86_64",
"product_id": "grpc-devel-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "grpc-source-1.60.0-3.1.x86_64",
"product": {
"name": "grpc-source-1.60.0-3.1.x86_64",
"product_id": "grpc-source-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-3.1.x86_64",
"product": {
"name": "libgrpc++1_60-1.60.0-3.1.x86_64",
"product_id": "libgrpc++1_60-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-3.1.x86_64",
"product": {
"name": "libgrpc1_60-1.60.0-3.1.x86_64",
"product_id": "libgrpc1_60-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-3.1.x86_64",
"product": {
"name": "libgrpc37-1.60.0-3.1.x86_64",
"product_id": "libgrpc37-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-3.1.x86_64",
"product": {
"name": "libupb37-1.60.0-3.1.x86_64",
"product_id": "libupb37-1.60.0-3.1.x86_64"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-3.1.x86_64",
"product": {
"name": "upb-devel-1.60.0-3.1.x86_64",
"product_id": "upb-devel-1.60.0-3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64"
},
"product_reference": "grpc-devel-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le"
},
"product_reference": "grpc-devel-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x"
},
"product_reference": "grpc-devel-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64"
},
"product_reference": "grpc-devel-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-source-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64"
},
"product_reference": "grpc-source-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-source-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le"
},
"product_reference": "grpc-source-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-source-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x"
},
"product_reference": "grpc-source-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-source-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64"
},
"product_reference": "grpc-source-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le"
},
"product_reference": "libgrpc++1_60-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x"
},
"product_reference": "libgrpc++1_60-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x"
},
"product_reference": "libgrpc1_60-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64"
},
"product_reference": "libgrpc37-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x"
},
"product_reference": "libgrpc37-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64"
},
"product_reference": "libgrpc37-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64"
},
"product_reference": "libupb37-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le"
},
"product_reference": "libupb37-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x"
},
"product_reference": "libupb37-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64"
},
"product_reference": "libupb37-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-3.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64"
},
"product_reference": "upb-devel-1.60.0-3.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-3.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le"
},
"product_reference": "upb-devel-1.60.0-3.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-3.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x"
},
"product_reference": "upb-devel-1.60.0-3.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-3.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
},
"product_reference": "upb-devel-1.60.0-3.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32731"
}
],
"notes": [
{
"category": "general",
"text": "When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 \n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32731",
"url": "https://www.suse.com/security/cve/CVE-2023-32731"
},
{
"category": "external",
"summary": "SUSE Bug 1212180 for CVE-2023-32731",
"url": "https://bugzilla.suse.com/1212180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-32731"
},
{
"cve": "CVE-2023-32732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32732"
}
],
"notes": [
{
"category": "general",
"text": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32732",
"url": "https://www.suse.com/security/cve/CVE-2023-32732"
},
{
"category": "external",
"summary": "SUSE Bug 1212182 for CVE-2023-32732",
"url": "https://bugzilla.suse.com/1212182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-4785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4785"
}
],
"notes": [
{
"category": "general",
"text": "Lack of error handling in the TCP server in Google\u0027s gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. ",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4785",
"url": "https://www.suse.com/security/cve/CVE-2023-4785"
},
{
"category": "external",
"summary": "SUSE Bug 1215334 for CVE-2023-4785",
"url": "https://bugzilla.suse.com/1215334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-devel-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:grpc-source-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc++1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc1_60-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libgrpc37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:libupb37-1.60.0-3.1.x86_64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.aarch64",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.ppc64le",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.s390x",
"openSUSE Tumbleweed:upb-devel-1.60.0-3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-06-15T00:00:00Z",
"details": "important"
}
],
"title": "CVE-2023-4785"
}
]
}
VDE-2024-073
Vulnerability from csaf_phoenixcontactgmbhcokg - Published: 2024-12-09 11:00 - Updated: 2025-05-22 13:03When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malicious server to stream an endless series of headers and eventually cause curl to run out of heap memory.
When saving HSTS data to an excessively long file name, curl could end up removing all contents, making subsequent requests using that file unaware of the HSTS status they should otherwise use.
This flaw allows a malicious HTTP server to set "super cookies" in curl that are then passed back to more origins than what is otherwise allowed or possible. This allows a site to set cookies that then would get sent to different and unrelated sites and domains. It could do this by exploiting a mixed case flaw in curl's function that verifies a given cookie domain against the Public Suffix List (PSL). For example a cookie could be set with 'domain=co.UK' when the URL used a lower case hostname 'curl.co.uk', even though 'co.uk' is listed as a PSL domain.
This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy handshake. When curl is asked to pass along the host name to the SOCKS5 proxy to allow that to resolve the address instead of it getting done by curl itself, the maximum length that host name can be is 255 bytes. If the host name is detected to be longer, curl switches to local name resolving and instead passes on the resolved address only. Due to this bug, the local variable that means "let the host resolve the name" could get the wrong value during a slow SOCKS5 handshake, and contrary to the intention, copy the too long host name to the target buffer instead of copying just the resolved address there. The target buffer being a heap based buffer, and the host name coming from the URL that curl has been told to operate with.
This flaw allows an attacker to insert cookies at will into a running program using libcurl, if the specific series of conditions are met. libcurl performs transfers. In its API, an application creates "easy handles" that are the individual handles for single transfers. libcurl provides a function call that duplicates en easy handle called [curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html). If a transfer has cookies enabled when the handle is duplicated, the cookie-enable state is also cloned - but without cloning the actual cookies. If the source handle did not read any cookies from a specific file on disk, the cloned version of the handle would instead store the file name as 'none' (using the four ASCII letters, no quotes). Subsequent use of the cloned handle that does not explicitly set a source to load cookies from would then inadvertently load cookies from a file named 'none' - if such a file exists and is readable in the current directory of the program using libcurl. And if using the correct file format of course.
CWE-73 - External Control of File Name or PathD-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: "File" is the name of an Open Source project.
A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.
A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.
A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.
A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.
A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.
A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.
A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.
A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.
A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.
gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks: - Unbounded memory buffering in the HPACK parser - Unbounded CPU consumption in the HPACK parser The unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client. The unbounded memory buffering bugs: - The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb. - HPACK varints have an encoding quirk whereby an infinite number of 0's can be added at the start of an integer. gRPC's hpack parser needed to read all of them before concluding a parse. - gRPC's metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc…
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for '-bin' suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url
Lack of error handling in the TCP server in Google's gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected.
The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp<cpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a '\0' character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.
praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.
Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.
Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.
The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH's use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.
In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.
In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.
Issue summary: A bug has been identified in the processing of key and initialisation vector (IV) lengths. This can lead to potential truncation or overruns during the initialisation of some symmetric ciphers. Impact summary: A truncation in the IV can result in non-uniqueness, which could result in loss of confidentiality for some cipher modes. When calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or EVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after the key and IV have been established. Any alterations to the key length, via the "keylen" parameter or the IV length, via the "ivlen" parameter, within the OSSL_PARAM array will not take effect as intended, potentially causing truncation or overreading of these values. The following ciphers and cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB. For the CCM, GCM and OCB cipher modes, truncation of the IV can result in loss of confidentiality. For example, when following NIST's SP 800-38D section 8.2.1 guidance for constructing a deterministic IV for AES in GCM mode, truncation of the counter portion could lead to IV reuse. Both truncations and overruns of the key and overruns of the IV will produce incorrect results and could, in some cases, trigger a memory exception. However, these issues are not currently assessed as security critical. Changing the key and/or IV lengths is not considered to be a common operation and the vulnerable API was recently introduced. Furthermore it is likely that application developers will have spotted this problem during testing since decryption would fail unless both peers in the communication were similarly vulnerable. For these reasons we expect the probability of an application being vulnerable to this to be quite low. However if an application is vulnerable then this issue is considered very serious. For these reasons we have assessed this issue as Moderate severity overall. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because the issue lies outside of the FIPS provider boundary. OpenSSL 3.1 and 3.0 are vulnerable to this issue.
Issue summary: The POLY1305 MAC (message authentication code) implementation contains a bug that might corrupt the internal state of applications on the Windows 64 platform when running on newer X86_64 processors supporting the AVX512-IFMA instructions. Impact summary: If in an application that uses the OpenSSL library an attacker can influence whether the POLY1305 MAC algorithm is used, the application state might be corrupted with various application dependent consequences. The POLY1305 MAC (message authentication code) implementation in OpenSSL does not save the contents of non-volatile XMM registers on Windows 64 platform when calculating the MAC of data larger than 64 bytes. Before returning to the caller all the XMM registers are set to zero rather than restoring their previous content. The vulnerable code is used only on newer x86_64 processors supporting the AVX512-IFMA instructions. The consequences of this kind of internal application state corruption can be various - from no consequences, if the calling application does not depend on the contents of non-volatile XMM registers at all, to the worst consequences, where the attacker could get complete control of the application process. However given the contents of the registers are just zeroized so the attacker cannot put arbitrary values inside, the most likely consequence, if any, would be an incorrect result of some application dependent calculations or a crash leading to a denial of service. The POLY1305 MAC algorithm is most frequently used as part of the CHACHA20-POLY1305 AEAD (authenticated encryption with associated data) algorithm. The most common usage of this AEAD cipher is with TLS protocol versions 1.2 and 1.3 and a malicious client can influence whether this AEAD cipher is used by the server. This implies that server applications using OpenSSL can be potentially impacted. However we are currently not aware of any concrete application that would be affected by this issue therefore we consider this a Low severity security issue. As a workaround the AVX512-IFMA instructions support can be disabled at runtime by setting the environment variable OPENSSL_ia32cap: OPENSSL_ia32cap=:~0x200000 The FIPS provider is not affected by this issue.
Issue summary: Checking excessively long DH keys or parameters may be very slow. Impact summary: Applications that use the functions DH_check(), DH_check_ex() or EVP_PKEY_param_check() to check a DH key or DH parameters may experience long delays. Where the key or parameters that are being checked have been obtained from an untrusted source this may lead to a Denial of Service. The function DH_check() performs various checks on DH parameters. After fixing CVE-2023-3446 it was discovered that a large q parameter value can also trigger an overly long computation during some of these checks. A correct q value, if present, cannot be larger than the modulus p parameter, thus it is unnecessary to perform these checks if q is larger than p. An application that calls DH_check() and supplies a key or parameters obtained from an untrusted source could be vulnerable to a Denial of Service attack. The function DH_check() is itself called by a number of other OpenSSL functions. An application calling any of those other functions may similarly be affected. The other functions affected by this are DH_check_ex() and EVP_PKEY_param_check(). Also vulnerable are the OpenSSL dhparam and pkeyparam command line applications when using the "-check" option. The OpenSSL SSL/TLS implementation is not affected by this issue. The OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.
In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.
Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
Under some circumstances, this weakness allows a user who has access to run the 'ps' utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
CWE-122 - Heap-based Buffer OverflowA vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.
CWE-1319 - Improper Protection against Electromagnetic Fault Injection (EM-FI)NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.
Use After Free in GitHub repository vim/vim prior to 9.0.1840.
Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833.
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.
Use After Free in GitHub repository vim/vim prior to 9.0.1857.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.
Use After Free in GitHub repository vim/vim prior to 9.0.1858.
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.
Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit '25aabc2b' which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-416 - Use After FreeVim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit '6bf131888' which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.
CWE-190 - Integer Overflow or WraparoundVim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a ':s' command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive ':s' call causes free-ing of memory which may later then be accessed by the initial ':s' command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.
CWE-416 - Use After FreeVim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function 'ga_grow_inner' in in the file 'src/alloc.c' at line 748, which is freed in the file 'src/ex_docmd.c' in the function 'do_cmdline' at line 1010 and then used again in 'src/cmdhist.c' at line 759. When using the ':history' command, it's possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.
MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.
{
"document": {
"acknowledgments": [
{
"organization": "CERT@VDE",
"summary": "coordination.",
"urls": [
"https://certvde.com"
]
}
],
"aggregate_severity": {
"namespace": "https://www.first.org/cvss/v3.1/specification-document#Qualitative-Severity-Rating-Scale",
"text": "Critical"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-GB",
"notes": [
{
"category": "summary",
"text": "Multiple Linux component vulnerabilities fixed in latest PLCnext Firmware release 2024.0.6 LTS",
"title": "Summary"
},
{
"category": "description",
"text": "Availability, integrity, or confidentiality of the PLCnext Control might be compromised by attacks using these vulnerabilities.",
"title": "Impact"
},
{
"category": "description",
"text": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"title": "Remediation"
},
{
"category": "general",
"text": "Phoenix Contact recommends operating network-capable devices in closed networks or protected with a suitable firewall. For detailed information on our recommendations for measures to protect network-capable devices, please refer to our [application note](https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf).",
"title": "General Recommendation"
}
],
"publisher": {
"category": "vendor",
"contact_details": "psirt@phoenixcontact.com",
"name": "Phoenix Contact GmbH \u0026 Co. KG",
"namespace": "https://phoenixcontact.com/psirt"
},
"references": [
{
"category": "external",
"summary": "PCSA-2024/00017",
"url": "https://phoenixcontact.com/psirt"
},
{
"category": "external",
"summary": "Phoenix Contact advisory overview at CERT@VDE",
"url": "https://certvde.com/de/advisories/vendor/phoenixcontact/"
},
{
"category": "external",
"summary": "Phoenix Contact application note",
"url": "https://dam-mdc.phoenixcontact.com/asset/156443151564/0a870ae433c19148b80bd760f3a1c1f2/107913_en_03.pdf"
},
{
"category": "self",
"summary": "VDE-2024-073: Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware - HTML",
"url": "https://certvde.com/en/advisories/VDE-2024-073"
},
{
"category": "self",
"summary": "VDE-2024-073: Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware - CSAF",
"url": "https://phoenixcontact.csaf-tp.certvde.com/.well-known/csaf/white/2024/vde-2024-073.json"
}
],
"source_lang": "en",
"title": "Phoenix Contact: Multiple Vulnerabilities in PLCnext Firmware",
"tracking": {
"aliases": [
"VDE-2024-073",
"PCSA-2024/00017"
],
"current_release_date": "2025-05-22T13:03:10.000Z",
"generator": {
"date": "2024-12-03T08:39:24.953Z",
"engine": {
"name": "Secvisogram",
"version": "2.5.15"
}
},
"id": "VDE-2024-073",
"initial_release_date": "2024-12-09T11:00:00.000Z",
"revision_history": [
{
"date": "2024-12-09T11:00:00.000Z",
"number": "1",
"summary": "Initial"
},
{
"date": "2025-03-26T11:22:00.000Z",
"number": "2",
"summary": "Fixed publisher information. Removed the space after the version operator."
},
{
"date": "2025-05-22T13:03:10.000Z",
"number": "3",
"summary": "Fix: quotation mark"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "AXC F 1152",
"product": {
"name": "AXC F 1152",
"product_id": "CSAFPID-11001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 2152",
"product": {
"name": "AXC F 2152",
"product_id": "CSAFPID-11002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
}
},
{
"category": "product_name",
"name": "AXC F 3152",
"product": {
"name": "AXC F 3152",
"product_id": "CSAFPID-11003",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072S",
"product": {
"name": "RFC 4072S",
"product_id": "CSAFPID-11004",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
}
},
{
"category": "product_name",
"name": "RFC 4072R",
"product": {
"name": "RFC 4072R",
"product_id": "CSAFPID-11005",
"product_identification_helper": {
"model_numbers": [
"1136419"
]
}
}
},
{
"category": "product_name",
"name": "BPC 9102S",
"product": {
"name": "BPC 9102S",
"product_id": "CSAFPID-11011",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
}
},
{
"category": "product_name",
"name": "EPC 1502",
"product": {
"name": "EPC 1502",
"product_id": "CSAFPID-11009",
"product_identification_helper": {
"model_numbers": [
"1185416"
]
}
}
},
{
"category": "product_name",
"name": "EPC 1522",
"product": {
"name": "EPC 1522",
"product_id": "CSAFPID-11010",
"product_identification_helper": {
"model_numbers": [
"1264328"
]
}
}
}
],
"category": "product_family",
"name": "Hardware"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c2024.0.6 LTS",
"product": {
"name": "Firmware \u003c2024.0.6 LTS",
"product_id": "CSAFPID-21001"
}
},
{
"category": "product_version_range",
"name": "\u003c2024.0.3 LTS",
"product": {
"name": "Firmware \u003c2024.0.3 LTS",
"product_id": "CSAFPID-21003"
}
},
{
"category": "product_version",
"name": "2024.0.6 LTS",
"product": {
"name": "Firmware 2024.0.6 LTS",
"product_id": "CSAFPID-22001"
}
},
{
"category": "product_version",
"name": "2024.0.3 LTS",
"product": {
"name": "Firmware 2024.0.3 LTS",
"product_id": "CSAFPID-22002"
}
}
],
"category": "product_family",
"name": "Firmware"
}
],
"category": "vendor",
"name": "Phoenix Contact GmbH \u0026 Co. KG"
}
],
"product_groups": [
{
"group_id": "CSAFGID-61001",
"product_ids": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
],
"summary": "Affected Products."
},
{
"group_id": "CSAFGID-62001",
"product_ids": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"summary": "Fixed Product."
}
],
"relationships": [
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on AXC F 1152",
"product_id": "CSAFPID-31001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on AXC F 1152",
"product_id": "CSAFPID-32001",
"product_identification_helper": {
"model_numbers": [
"1151412"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11001"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on AXC F 2152",
"product_id": "CSAFPID-31002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on AXC F 2152",
"product_id": "CSAFPID-32002",
"product_identification_helper": {
"model_numbers": [
"2404267"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11002"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on AXC F 3152",
"product_id": "CSAFPID-31004",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on AXC F 3152",
"product_id": "CSAFPID-32004",
"product_identification_helper": {
"model_numbers": [
"1069208"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11003"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on RFC 4072S",
"product_id": "CSAFPID-31005",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on RFC 4072S",
"product_id": "CSAFPID-32005",
"product_identification_helper": {
"model_numbers": [
"1051328"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11004"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on BPC 9102S",
"product_id": "CSAFPID-31007",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on BPC 9102S",
"product_id": "CSAFPID-32007",
"product_identification_helper": {
"model_numbers": [
"1246285"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11011"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.6 LTS installed on RFC 4072R",
"product_id": "CSAFPID-31008",
"product_identification_helper": {
"model_numbers": [
"1136419"
]
}
},
"product_reference": "CSAFPID-21001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.6 LTS installed on RFC 4072R",
"product_id": "CSAFPID-32008",
"product_identification_helper": {
"model_numbers": [
"1136419"
]
}
},
"product_reference": "CSAFPID-22001",
"relates_to_product_reference": "CSAFPID-11005"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.3 LTS installed on EPC 1502",
"product_id": "CSAFPID-31009",
"product_identification_helper": {
"model_numbers": [
"1185416"
]
}
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.3 LTS installed on EPC 1502",
"product_id": "CSAFPID-32009",
"product_identification_helper": {
"model_numbers": [
"1185416"
]
}
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11009"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware \u003c2024.0.3 LTS installed on EPC 1522",
"product_id": "CSAFPID-31010",
"product_identification_helper": {
"model_numbers": [
"1264328"
]
}
},
"product_reference": "CSAFPID-21003",
"relates_to_product_reference": "CSAFPID-11010"
},
{
"category": "installed_on",
"full_product_name": {
"name": "Firmware 2024.0.3 LTS installed on EPC 1522",
"product_id": "CSAFPID-32010",
"product_identification_helper": {
"model_numbers": [
"1264328"
]
}
},
"product_reference": "CSAFPID-22002",
"relates_to_product_reference": "CSAFPID-11010"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-38039",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-38039](https://nvd.nist.gov/vuln/detail/CVE-2023-38039)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "When curl retrieves an HTTP response, it stores the incoming headers so that\nthey can be accessed later via the libcurl headers API.\n\nHowever, curl did not have a limit in how many or how large headers it would\naccept in a response, allowing a malicious server to stream an endless series\nof headers and eventually cause curl to run out of heap memory.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-38039"
},
{
"cve": "CVE-2023-46219",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-46219](https://nvd.nist.gov/vuln/detail/CVE-2023-46219)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "When saving HSTS data to an excessively long file name, curl could end up\nremoving all contents, making subsequent requests using that file unaware of\nthe HSTS status they should otherwise use.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-46219"
},
{
"cve": "CVE-2023-46218",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-46218](https://nvd.nist.gov/vuln/detail/CVE-2023-46218)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "This flaw allows a malicious HTTP server to set \"super cookies\" in curl that\nare then passed back to more origins than what is otherwise allowed or\npossible. This allows a site to set cookies that then would get sent to\ndifferent and unrelated sites and domains.\n\nIt could do this by exploiting a mixed case flaw in curl\u0027s function that\nverifies a given cookie domain against the Public Suffix List (PSL). For\nexample a cookie could be set with \u0027domain=co.UK\u0027 when the URL used a lower\ncase hostname \u0027curl.co.uk\u0027, even though \u0027co.uk\u0027 is listed as a PSL domain.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-46218"
},
{
"cve": "CVE-2023-38545",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-38545](https://nvd.nist.gov/vuln/detail/CVE-2023-38545)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "This flaw makes curl overflow a heap based buffer in the SOCKS5 proxy\nhandshake.\n\nWhen curl is asked to pass along the host name to the SOCKS5 proxy to allow\nthat to resolve the address instead of it getting done by curl itself, the\nmaximum length that host name can be is 255 bytes.\n\nIf the host name is detected to be longer, curl switches to local name\nresolving and instead passes on the resolved address only. Due to this bug,\nthe local variable that means \"let the host resolve the name\" could get the\nwrong value during a slow SOCKS5 handshake, and contrary to the intention,\ncopy the too long host name to the target buffer instead of copying just the\nresolved address there.\n\nThe target buffer being a heap based buffer, and the host name coming from the\nURL that curl has been told to operate with.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-38545"
},
{
"cve": "CVE-2023-38546",
"cwe": {
"id": "CWE-73",
"name": "External Control of File Name or Path"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-38546](https://nvd.nist.gov/vuln/detail/CVE-2023-38546)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "This flaw allows an attacker to insert cookies at will into a running program\nusing libcurl, if the specific series of conditions are met.\n\nlibcurl performs transfers. In its API, an application creates \"easy handles\"\nthat are the individual handles for single transfers.\n\nlibcurl provides a function call that duplicates en easy handle called\n[curl_easy_duphandle](https://curl.se/libcurl/c/curl_easy_duphandle.html).\n\nIf a transfer has cookies enabled when the handle is duplicated, the\ncookie-enable state is also cloned - but without cloning the actual\ncookies. If the source handle did not read any cookies from a specific file on\ndisk, the cloned version of the handle would instead store the file name as\n\u0027none\u0027 (using the four ASCII letters, no quotes).\n\nSubsequent use of the cloned handle that does not explicitly set a source to\nload cookies from would then inadvertently load cookies from a file named\n\u0027none\u0027 - if such a file exists and is readable in the current directory of the\nprogram using libcurl. And if using the correct file format of course.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 3.7,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.7,
"environmentalSeverity": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.7,
"temporalSeverity": "LOW",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-38546"
},
{
"cve": "CVE-2023-34969",
"cwe": {
"id": "CWE-617",
"name": "Reachable Assertion"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-34969](https://nvd.nist.gov/vuln/detail/CVE-2023-34969)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2022-42010",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-42010](https://nvd.nist.gov/vuln/detail/CVE-2022-42010)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-42010"
},
{
"cve": "CVE-2022-42011",
"cwe": {
"id": "CWE-129",
"name": "Improper Validation of Array Index"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-42011](https://nvd.nist.gov/vuln/detail/CVE-2022-42011)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-42011"
},
{
"cve": "CVE-2022-42012",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-42012](https://nvd.nist.gov/vuln/detail/CVE-2022-42012)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-42012"
},
{
"cve": "CVE-2022-48554",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-48554](https://nvd.nist.gov/vuln/detail/CVE-2022-48554)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "File before 5.43 has an stack-based buffer over-read in file_copystr in funcs.c. NOTE: \"File\" is the name of an Open Source project.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-48554"
},
{
"cve": "CVE-2023-29499",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Gvariant offset table entry size is not checked in is_normal()",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-29499](https://nvd.nist.gov/vuln/detail/CVE-2023-29499)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in GLib. GVariant deserialization fails to validate that the input conforms to the expected format, leading to denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-29499"
},
{
"cve": "CVE-2023-32636",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32636](https://nvd.nist.gov/vuln/detail/CVE-2023-32636)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in glib, where the gvariant deserialization code is vulnerable to a denial of service introduced by additional input validation added to resolve CVE-2023-29499. The offset table validation may be very slow. This bug does not affect any released version of glib but does affect glib distributors who followed the guidance of glib developers to backport the initial fix for CVE-2023-29499.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4.7,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.7,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32636"
},
{
"cve": "CVE-2023-32643",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32643](https://nvd.nist.gov/vuln/detail/CVE-2023-32643)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in GLib. The GVariant deserialization code is vulnerable to a heap buffer overflow introduced by the fix for CVE-2023-32665. This bug does not affect any released version of GLib, but does affect GLib distributors who followed the guidance of GLib developers to backport the initial fix for CVE-2023-32665.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32643"
},
{
"cve": "CVE-2023-32611",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "G_variant_byteswap() can take a long time with some non-normal inputs",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32611](https://nvd.nist.gov/vuln/detail/CVE-2023-32611)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in GLib. GVariant deserialization is vulnerable to a slowdown issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32611"
},
{
"cve": "CVE-2023-32665",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Gvariant deserialisation does not match spec for non-normal data",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32665](https://nvd.nist.gov/vuln/detail/CVE-2023-32665)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in GLib. GVariant deserialization is vulnerable to an exponential blowup issue where a crafted GVariant can cause excessive processing, leading to denial of service.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32665"
},
{
"cve": "CVE-2023-5156",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Glibc: dos due to memory leak in getaddrinfo.c",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-5156](https://nvd.nist.gov/vuln/detail/CVE-2023-5156)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in the GNU C Library. A recent fix for CVE-2023-4806 introduced the potential for a memory leak, which may result in an application crash.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-5156"
},
{
"cve": "CVE-2023-4911",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Glibc: buffer overflow in ld.so leading to privilege escalation",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4911](https://nvd.nist.gov/vuln/detail/CVE-2023-4911)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A buffer overflow was discovered in the GNU C Library\u0027s dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted GLIBC_TUNABLES environment variables when launching binaries with SUID permission to execute code with elevated privileges.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4911"
},
{
"cve": "CVE-2024-0553",
"cwe": {
"id": "CWE-203",
"name": "Observable Discrepancy"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Gnutls: incomplete fix for cve-2023-5981",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-0553](https://nvd.nist.gov/vuln/detail/CVE-2024-0553)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A vulnerability was found in GnuTLS. The response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from the response times of ciphertexts with correct PKCS#1 v1.5 padding. This issue may allow a remote attacker to perform a timing side-channel attack in the RSA-PSK key exchange, potentially leading to the leakage of sensitive data. CVE-2024-0553 is designated as an incomplete resolution for CVE-2023-5981.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2024-0553"
},
{
"cve": "CVE-2024-0567",
"cwe": {
"id": "CWE-347",
"name": "Improper Verification of Cryptographic Signature"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Gnutls: rejects certificate chain with distributed trust",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2024-0567](https://nvd.nist.gov/vuln/detail/CVE-2024-0567)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A vulnerability was found in GnuTLS, where a cockpit (which uses gnuTLS) rejects a certificate chain with distributed trust. This issue occurs when validating a certificate chain with cockpit-certificate-ensure. This flaw allows an unauthenticated, remote client or attacker to initiate a denial of service attack.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2024-0567"
},
{
"cve": "CVE-2023-33953",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Denial-of-Service in gRPC",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-33953](https://nvd.nist.gov/vuln/detail/CVE-2023-33953)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:\n\n- Unbounded memory buffering in the HPACK parser\n- Unbounded CPU consumption in the HPACK parser\n\nThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.\n\nThe unbounded memory buffering bugs:\n\n- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.\n- HPACK varints have an encoding quirk whereby an infinite number of 0\u0027s can be added at the start of an integer. gRPC\u0027s hpack parser needed to read all of them before concluding a parse.\n- gRPC\u0027s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc\u2026",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-32731",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Information leak in gRPC",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32731](https://nvd.nist.gov/vuln/detail/CVE-2023-32731)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 \n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.4,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.4,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.4,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32731"
},
{
"cve": "CVE-2023-32732",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Denial-of-Service in gRPC",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-32732](https://nvd.nist.gov/vuln/detail/CVE-2023-32732)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for \u0027-bin\u0027 suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-4785",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Denial of Service in gRPC Core ",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4785](https://nvd.nist.gov/vuln/detail/CVE-2023-4785)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Lack of error handling in the TCP server in Google\u0027s gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. ",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-44487](https://nvd.nist.gov/vuln/detail/CVE-2023-44487)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-2603",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-2603](https://nvd.nist.gov/vuln/detail/CVE-2023-2603)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-2603"
},
{
"cve": "CVE-2023-6004",
"cwe": {
"id": "CWE-74",
"name": "Improper Neutralization of Special Elements in Output Used by a Downstream Component (\u0027Injection\u0027)"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Libssh: proxycommand/proxyjump features allow injection of malicious code through hostname",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-6004](https://nvd.nist.gov/vuln/detail/CVE-2023-6004)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A flaw was found in libssh. By utilizing the ProxyCommand or ProxyJump feature, users can exploit unchecked hostname syntax on the client. This issue may allow an attacker to inject malicious code into the command of the features mentioned through the hostname parameter.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 4.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-6004"
},
{
"cve": "CVE-2023-26551",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-26551](https://nvd.nist.gov/vuln/detail/CVE-2023-26551)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write in the cp\u003ccpdec while loop. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-26551"
},
{
"cve": "CVE-2023-26552",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-26552](https://nvd.nist.gov/vuln/detail/CVE-2023-26552)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a decimal point. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-26552"
},
{
"cve": "CVE-2023-26553",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-26553](https://nvd.nist.gov/vuln/detail/CVE-2023-26553)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when copying the trailing number. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-26553"
},
{
"cve": "CVE-2023-26554",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-26554](https://nvd.nist.gov/vuln/detail/CVE-2023-26554)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "mstolfp in libntp/mstolfp.c in NTP 4.2.8p15 has an out-of-bounds write when adding a \u0027\\0\u0027 character. An adversary may be able to attack a client ntpq process, but cannot attack ntpd.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-26554"
},
{
"cve": "CVE-2023-26555",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-26555](https://nvd.nist.gov/vuln/detail/CVE-2023-26555)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "praecis_parse in ntpd/refclock_palisade.c in NTP 4.2.8p15 has an out-of-bounds write. Any attack method would be complex, e.g., with a manipulated GPS receiver.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "PHYSICAL",
"availabilityImpact": "HIGH",
"baseScore": 6.4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-26555"
},
{
"cve": "CVE-2022-29900",
"cwe": {
"id": "CWE-212",
"name": "Improper Removal of Sensitive Information Before Storage or Transfer"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-29900](https://nvd.nist.gov/vuln/detail/CVE-2022-29900)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Mis-trained branch predictions for return instructions may allow arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
{
"cvss_v2": {
"baseScore": 2.1,
"vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-29900"
},
{
"cve": "CVE-2022-29901",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Arbitrary Memory Disclosure through CPU Side-Channel Attacks (Retbleed)",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-29901](https://nvd.nist.gov/vuln/detail/CVE-2022-29901)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Intel microprocessor generations 6 to 8 are affected by a new Spectre variant that is able to bypass their retpoline mitigation in the kernel to leak arbitrary data. An attacker with unprivileged user access can hijack return instructions to achieve arbitrary speculative code execution under certain microarchitecture-dependent conditions.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.6,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.6,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"temporalScore": 5.6,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-29901"
},
{
"cve": "CVE-2023-48795",
"cwe": {
"id": "CWE-354",
"name": "Improper Validation of Integrity Check Value"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-48795](https://nvd.nist.gov/vuln/detail/CVE-2023-48795)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "The SSH transport protocol with certain OpenSSH extensions, found in OpenSSH before 9.6 and other products, allows remote attackers to bypass integrity checks such that some packets are omitted (from the extension negotiation message), and a client and server may consequently end up with a connection for which some security features have been downgraded or disabled, aka a Terrapin attack. This occurs because the SSH Binary Packet Protocol (BPP), implemented by these extensions, mishandles the handshake phase and mishandles use of sequence numbers. For example, there is an effective attack against SSH\u0027s use of ChaCha20-Poly1305 (and CBC with Encrypt-then-MAC). The bypass occurs in chacha20-poly1305@openssh.com and (if CBC is used) the -etm@openssh.com MAC algorithms. This also affects Maverick Synergy Java SSH API before 3.1.0-SNAPSHOT, Dropbear through 2022.83, Ssh before 5.1.1 in Erlang/OTP, PuTTY before 0.80, AsyncSSH before 2.14.2, golang.org/x/crypto before 0.17.0, libssh before 0.10.6, libssh2 through 1.11.0, Thorn Tech SFTP Gateway before 3.4.6, Tera Term before 5.1, Paramiko before 3.4.0, jsch before 0.2.15, SFTPGo before 2.5.6, Netgate pfSense Plus through 23.09.1, Netgate pfSense CE through 2.7.2, HPN-SSH through 18.2.0, ProFTPD before 1.3.8b (and before 1.3.9rc2), ORYX CycloneSSH before 2.3.4, NetSarang XShell 7 before Build 0144, CrushFTP before 10.6.0, ConnectBot SSH library before 2.2.22, Apache MINA sshd through 2.11.0, sshj through 0.37.0, TinySSH through 20230101, trilead-ssh2 6401, LANCOM LCOS and LANconfig, FileZilla before 3.66.4, Nova before 11.8, PKIX-SSH before 14.4, SecureCRT before 9.4.3, Transmit5 before 5.10.4, Win32-OpenSSH before 9.5.0.0p1-Beta, WinSCP before 6.2.2, Bitvise SSH Server before 9.32, Bitvise SSH Client before 9.33, KiTTY through 0.76.1.13, the net-ssh gem 7.2.0 for Ruby, the mscdex ssh2 module before 1.15.0 for Node.js, the thrussh library before 0.35.1 for Rust, and the Russh crate before 0.40.2 for Rust.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-48795"
},
{
"cve": "CVE-2023-51384",
"cwe": {
"id": "CWE-304",
"name": "Missing Critical Step in Authentication"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-51384](https://nvd.nist.gov/vuln/detail/CVE-2023-51384)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "In ssh-agent in OpenSSH before 9.6, certain destination constraints can be incompletely applied. When destination constraints are specified during addition of PKCS#11-hosted private keys, these constraints are only applied to the first key, even if a PKCS#11 token returns multiple keys.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-51384"
},
{
"cve": "CVE-2023-51385",
"cwe": {
"id": "CWE-78",
"name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-51385](https://nvd.nist.gov/vuln/detail/CVE-2023-51385)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "In ssh in OpenSSH before 9.6, OS command injection might occur if a user name or host name has shell metacharacters, and this name is referenced by an expansion token in certain situations. For example, an untrusted Git repository can have a submodule with shell metacharacters in a user name or host name.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 6.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-51385"
},
{
"cve": "CVE-2023-5363",
"cwe": {
"id": "CWE-684",
"name": "Incorrect Provision of Specified Functionality"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Incorrect cipher key \u0026 IV length processing",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-5363](https://nvd.nist.gov/vuln/detail/CVE-2023-5363)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Issue summary: A bug has been identified in the processing of key and\ninitialisation vector (IV) lengths. This can lead to potential truncation\nor overruns during the initialisation of some symmetric ciphers.\n\nImpact summary: A truncation in the IV can result in non-uniqueness,\nwhich could result in loss of confidentiality for some cipher modes.\n\nWhen calling EVP_EncryptInit_ex2(), EVP_DecryptInit_ex2() or\nEVP_CipherInit_ex2() the provided OSSL_PARAM array is processed after\nthe key and IV have been established. Any alterations to the key length,\nvia the \"keylen\" parameter or the IV length, via the \"ivlen\" parameter,\nwithin the OSSL_PARAM array will not take effect as intended, potentially\ncausing truncation or overreading of these values. The following ciphers\nand cipher modes are impacted: RC2, RC4, RC5, CCM, GCM and OCB.\n\nFor the CCM, GCM and OCB cipher modes, truncation of the IV can result in\nloss of confidentiality. For example, when following NIST\u0027s SP 800-38D\nsection 8.2.1 guidance for constructing a deterministic IV for AES in\nGCM mode, truncation of the counter portion could lead to IV reuse.\n\nBoth truncations and overruns of the key and overruns of the IV will\nproduce incorrect results and could, in some cases, trigger a memory\nexception. However, these issues are not currently assessed as security\ncritical.\n\nChanging the key and/or IV lengths is not considered to be a common operation\nand the vulnerable API was recently introduced. Furthermore it is likely that\napplication developers will have spotted this problem during testing since\ndecryption would fail unless both peers in the communication were similarly\nvulnerable. For these reasons we expect the probability of an application being\nvulnerable to this to be quite low. However if an application is vulnerable then\nthis issue is considered very serious. For these reasons we have assessed this\nissue as Moderate severity overall.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this because\nthe issue lies outside of the FIPS provider boundary.\n\nOpenSSL 3.1 and 3.0 are vulnerable to this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.5,
"environmentalSeverity": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.5,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2023-4807",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "POLY1305 MAC implementation corrupts XMM registers on Windows",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4807](https://nvd.nist.gov/vuln/detail/CVE-2023-4807)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Issue summary: The POLY1305 MAC (message authentication code) implementation\ncontains a bug that might corrupt the internal state of applications on the\nWindows 64 platform when running on newer X86_64 processors supporting the\nAVX512-IFMA instructions.\n\nImpact summary: If in an application that uses the OpenSSL library an attacker\ncan influence whether the POLY1305 MAC algorithm is used, the application\nstate might be corrupted with various application dependent consequences.\n\nThe POLY1305 MAC (message authentication code) implementation in OpenSSL does\nnot save the contents of non-volatile XMM registers on Windows 64 platform\nwhen calculating the MAC of data larger than 64 bytes. Before returning to\nthe caller all the XMM registers are set to zero rather than restoring their\nprevious content. The vulnerable code is used only on newer x86_64 processors\nsupporting the AVX512-IFMA instructions.\n\nThe consequences of this kind of internal application state corruption can\nbe various - from no consequences, if the calling application does not\ndepend on the contents of non-volatile XMM registers at all, to the worst\nconsequences, where the attacker could get complete control of the application\nprocess. However given the contents of the registers are just zeroized so\nthe attacker cannot put arbitrary values inside, the most likely consequence,\nif any, would be an incorrect result of some application dependent\ncalculations or a crash leading to a denial of service.\n\nThe POLY1305 MAC algorithm is most frequently used as part of the\nCHACHA20-POLY1305 AEAD (authenticated encryption with associated data)\nalgorithm. The most common usage of this AEAD cipher is with TLS protocol\nversions 1.2 and 1.3 and a malicious client can influence whether this AEAD\ncipher is used by the server. This implies that server applications using\nOpenSSL can be potentially impacted. However we are currently not aware of\nany concrete application that would be affected by this issue therefore we\nconsider this a Low severity security issue.\n\nAs a workaround the AVX512-IFMA instructions support can be disabled at\nruntime by setting the environment variable OPENSSL_ia32cap:\n\n OPENSSL_ia32cap=:~0x200000\n\nThe FIPS provider is not affected by this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-3817",
"cwe": {
"id": "CWE-606",
"name": "Unchecked Input for Loop Condition"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Excessive time spent checking DH q parameter value",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-3817](https://nvd.nist.gov/vuln/detail/CVE-2023-3817)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Issue summary: Checking excessively long DH keys or parameters may be very slow.\n\nImpact summary: Applications that use the functions DH_check(), DH_check_ex()\nor EVP_PKEY_param_check() to check a DH key or DH parameters may experience long\ndelays. Where the key or parameters that are being checked have been obtained\nfrom an untrusted source this may lead to a Denial of Service.\n\nThe function DH_check() performs various checks on DH parameters. After fixing\nCVE-2023-3446 it was discovered that a large q parameter value can also trigger\nan overly long computation during some of these checks. A correct q value,\nif present, cannot be larger than the modulus p parameter, thus it is\nunnecessary to perform these checks if q is larger than p.\n\nAn application that calls DH_check() and supplies a key or parameters obtained\nfrom an untrusted source could be vulnerable to a Denial of Service attack.\n\nThe function DH_check() is itself called by a number of other OpenSSL functions.\nAn application calling any of those other functions may similarly be affected.\nThe other functions affected by this are DH_check_ex() and\nEVP_PKEY_param_check().\n\nAlso vulnerable are the OpenSSL dhparam and pkeyparam command line applications\nwhen using the \"-check\" option.\n\nThe OpenSSL SSL/TLS implementation is not affected by this issue.\n\nThe OpenSSL 3.0 and 3.1 FIPS providers are not affected by this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-47100",
"cwe": {
"id": "CWE-755",
"name": "Improper Handling of Exceptional Conditions"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-47100](https://nvd.nist.gov/vuln/detail/CVE-2023-47100)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "In Perl before 5.38.2, S_parse_uniprop_string in regcomp.c can write to unallocated space because a property name associated with a \\p{...} regular expression construct is mishandled. The earliest affected version is 5.30.0.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"environmentalScore": 9.8,
"environmentalSeverity": "CRITICAL",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 9.8,
"temporalSeverity": "CRITICAL",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-47100"
},
{
"cve": "CVE-2022-40897",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2022-40897](https://nvd.nist.gov/vuln/detail/CVE-2022-40897)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Python Packaging Authority (PyPA) setuptools before 65.5.1 allows remote attackers to cause a denial of service via HTML in a crafted package or custom PackageIndex page. There is a Regular Expression Denial of Service (ReDoS) in package_index.py.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 5.9,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.9,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2022-40897"
},
{
"cve": "CVE-2023-40217",
"cwe": {
"id": "CWE-305",
"name": "Authentication Bypass by Primary Weakness"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-40217](https://nvd.nist.gov/vuln/detail/CVE-2023-40217)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as \"not connected\" and won\u0027t initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.3,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 5.3,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-40217"
},
{
"cve": "CVE-2023-4016",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4016](https://nvd.nist.gov/vuln/detail/CVE-2023-4016)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Under some circumstances, this weakness allows a user who has access to run the \u0027ps\u0027 utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.5,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 2.5,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 2.5,
"temporalSeverity": "LOW",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4016"
},
{
"cve": "CVE-2023-7104",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"category": "summary",
"text": "SQLite SQLite3 make alltest sqlite3session.c sessionReadRecord heap-based overflow",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-7104](https://nvd.nist.gov/vuln/detail/CVE-2023-7104)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 5.5,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 5.5,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
{
"cvss_v2": {
"baseScore": 5.2,
"vectorString": "AV:A/AC:L/Au:S/C:P/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-7104"
},
{
"cve": "CVE-2021-41072",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2021-41072](https://nvd.nist.gov/vuln/detail/CVE-2021-41072)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"environmentalScore": 8.1,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.1,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
{
"cvss_v2": {
"baseScore": 5.8,
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:P",
"version": "2.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2021-41072"
},
{
"cve": "CVE-2023-42465",
"cwe": {
"id": "CWE-1319",
"name": "Improper Protection against Electromagnetic Fault Injection (EM-FI)"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-42465](https://nvd.nist.gov/vuln/detail/CVE-2023-42465)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Sudo before 1.9.15 might allow row hammer attacks (for authentication bypass or privilege escalation) because application logic sometimes is based on not equaling an error value (instead of equaling a success value), and because the values do not resist flips of a single bit.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7,
"temporalSeverity": "HIGH",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-42465"
},
{
"cve": "CVE-2023-5441",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "NULL Pointer Dereference in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-5441](https://nvd.nist.gov/vuln/detail/CVE-2023-5441)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "NULL Pointer Dereference in GitHub repository vim/vim prior to 20d161ace307e28690229b68584f2d84556f8960.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.2,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 6.2,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.2,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-5441"
},
{
"cve": "CVE-2023-5344",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Heap-based Buffer Overflow in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-5344](https://nvd.nist.gov/vuln/detail/CVE-2023-5344)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1969.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-5344"
},
{
"cve": "CVE-2023-5535",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Use After Free in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-5535](https://nvd.nist.gov/vuln/detail/CVE-2023-5535)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to v9.0.2010.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-5535"
},
{
"cve": "CVE-2023-4781",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Heap-based Buffer Overflow in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4781](https://nvd.nist.gov/vuln/detail/CVE-2023-4781)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1873.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4781"
},
{
"cve": "CVE-2023-4734",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Integer Overflow or Wraparound in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4734](https://nvd.nist.gov/vuln/detail/CVE-2023-4734)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.1846.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4734"
},
{
"cve": "CVE-2023-4733",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Use After Free in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4733](https://nvd.nist.gov/vuln/detail/CVE-2023-4733)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.1840.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.3,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.3,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 7.3,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4733"
},
{
"cve": "CVE-2023-4736",
"cwe": {
"id": "CWE-426",
"name": "Untrusted Search Path"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Untrusted Search Path in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4736](https://nvd.nist.gov/vuln/detail/CVE-2023-4736)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Untrusted Search Path in GitHub repository vim/vim prior to 9.0.1833.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4736"
},
{
"cve": "CVE-2023-4735",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Out-of-bounds Write in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4735](https://nvd.nist.gov/vuln/detail/CVE-2023-4735)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.1847.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalScore": 4.8,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 4.8,
"temporalSeverity": "MEDIUM",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4735"
},
{
"cve": "CVE-2023-4750",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Use After Free in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4750](https://nvd.nist.gov/vuln/detail/CVE-2023-4750)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.1857.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4750"
},
{
"cve": "CVE-2023-4738",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Heap-based Buffer Overflow in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4738](https://nvd.nist.gov/vuln/detail/CVE-2023-4738)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1848.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4738"
},
{
"cve": "CVE-2023-4752",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Use After Free in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4752](https://nvd.nist.gov/vuln/detail/CVE-2023-4752)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Use After Free in GitHub repository vim/vim prior to 9.0.1858.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4752"
},
{
"cve": "CVE-2023-4751",
"cwe": {
"id": "CWE-122",
"name": "Heap-based Buffer Overflow"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Heap-based Buffer Overflow in vim/vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-4751](https://nvd.nist.gov/vuln/detail/CVE-2023-4751)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.1331.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 7.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 7.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-4751"
},
{
"cve": "CVE-2023-48231",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Use-After-Free in win_close() in vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-48231](https://nvd.nist.gov/vuln/detail/CVE-2023-48231)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Vim is an open source command line text editor. When closing a window, vim may try to access already freed window structure. Exploitation beyond crashing the application has not been shown to be viable. This issue has been addressed in commit \u002725aabc2b\u0027 which has been included in release version 9.0.2106. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.9,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.9,
"environmentalSeverity": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 3.9,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-48231"
},
{
"cve": "CVE-2023-48237",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "overflow in shift_line in vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-48237](https://nvd.nist.gov/vuln/detail/CVE-2023-48237)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Vim is an open source command line text editor. In affected versions when shifting lines in operator pending mode and using a very large value, it may be possible to overflow the size of integer. Impact is low, user interaction is required and a crash may not even happen in all situations. This issue has been addressed in commit \u00276bf131888\u0027 which has been included in version 9.0.2112. Users are advised to upgrade. There are no known workarounds for this vulnerability.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 2.8,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 2.8,
"environmentalSeverity": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"temporalScore": 2.8,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-48237"
},
{
"cve": "CVE-2023-48706",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Vim has heap-use-after-free at /src/charset.c:1770:12 in skipwhite",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-48706](https://nvd.nist.gov/vuln/detail/CVE-2023-48706)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Vim is a UNIX editor that, prior to version 9.0.2121, has a heap-use-after-free vulnerability. When executing a \u0027:s\u0027 command for the very first time and using a sub-replace-special atom inside the substitution part, it is possible that the recursive \u0027:s\u0027 call causes free-ing of memory which may later then be accessed by the initial \u0027:s\u0027 command. The user must intentionally execute the payload and the whole process is a bit tricky to do since it seems to work only reliably for the very first :s command. It may also cause a crash of Vim. Version 9.0.2121 contains a fix for this issue.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "HIGH",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 3.6,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"environmentalScore": 3.6,
"environmentalSeverity": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 3.6,
"temporalSeverity": "LOW",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-48706"
},
{
"cve": "CVE-2023-46246",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"audience": "all",
"category": "summary",
"text": "Integer Overflow in :history command in Vim",
"title": "Summary"
},
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-46246](https://nvd.nist.gov/vuln/detail/CVE-2023-46246)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "Vim is an improved version of the good old UNIX editor Vi. Heap-use-after-free in memory allocated in the function \u0027ga_grow_inner\u0027 in in the file \u0027src/alloc.c\u0027 at line 748, which is freed in the file \u0027src/ex_docmd.c\u0027 in the function \u0027do_cmdline\u0027 at line 1010 and then used again in \u0027src/cmdhist.c\u0027 at line 759. When using the \u0027:history\u0027 command, it\u0027s possible that the provided argument overflows the accepted value. Causing an Integer Overflow and potentially later an use-after-free. This vulnerability has been patched in version 9.0.2068.\n",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "LOW",
"baseScore": 4,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"environmentalScore": 4,
"environmentalSeverity": "MEDIUM",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 4,
"temporalSeverity": "MEDIUM",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-46246"
},
{
"cve": "CVE-2023-45853",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"audience": "all",
"category": "details",
"text": "[https://nvd.nist.gov/vuln/detail/CVE-2023-45853](https://nvd.nist.gov/vuln/detail/CVE-2023-45853)",
"title": "Details"
},
{
"audience": "all",
"category": "description",
"text": "MiniZip in zlib through 1.3 has an integer overflow and resultant heap-based buffer overflow in zipOpenNewFileInZip4_64 via a long filename, comment, or extra field. NOTE: MiniZip is not a supported part of the zlib product. NOTE: pyminizip through 0.2.6 is also vulnerable because it bundles an affected zlib version, and exposes the applicable MiniZip code through its compress API.",
"title": "Vulnerability Description"
}
],
"product_status": {
"fixed": [
"CSAFPID-32001",
"CSAFPID-32002",
"CSAFPID-32004",
"CSAFPID-32005",
"CSAFPID-32007",
"CSAFPID-32008",
"CSAFPID-32009",
"CSAFPID-32010"
],
"known_affected": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
},
"remediations": [
{
"category": "vendor_fix",
"details": "Update to the latest 2024.0.6 LTS Firmware Release. PHOENIX CONTACT recommends to always use an up-to-date version of the PLCnext Engineer.",
"group_ids": [
"CSAFGID-61001"
]
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"environmentalScore": 8.8,
"environmentalSeverity": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 8.8,
"temporalSeverity": "HIGH",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-31001",
"CSAFPID-31002",
"CSAFPID-31004",
"CSAFPID-31005",
"CSAFPID-31007",
"CSAFPID-31008",
"CSAFPID-31009",
"CSAFPID-31010"
]
}
],
"title": "CVE-2023-45853"
}
]
}
NCSC-2025-0028
Vulnerability from csaf_ncscnl - Published: 2025-01-22 13:36 - Updated: 2025-01-22 13:36| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Oracle heeft kwetsbaarheden verholpen in Oracle Analytics producten, zoals Business Intelligence, Analytics Desktop en BI Publisher.",
"title": "Feiten"
},
{
"category": "description",
"text": "Een kwaadwillende kan de kwetsbaarheden misbruiken om een Denial-of-Service te veroorzaken, of zich toegang te verschaffen tot gevoelige gegevens.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Oracle heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
},
{
"category": "general",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "general",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
},
{
"category": "general",
"text": "Uncaught Exception",
"title": "CWE-248"
},
{
"category": "general",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
},
{
"category": "general",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
},
{
"category": "general",
"text": "Out-of-bounds Write",
"title": "CWE-787"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
},
{
"category": "general",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
},
{
"category": "general",
"text": "CWE-399",
"title": "CWE-399"
},
{
"category": "general",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
},
{
"category": "general",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
},
{
"category": "general",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "general",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "general",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "general",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference - cveprojectv5; nvd; oracle",
"url": "https://www.oracle.com/security-alerts/cpujan2025.html"
}
],
"title": "Kwetsbaarheden verholpen in Oracle Analytics",
"tracking": {
"current_release_date": "2025-01-22T13:36:58.196605Z",
"id": "NCSC-2025-0028",
"initial_release_date": "2025-01-22T13:36:58.196605Z",
"revision_history": [
{
"date": "2025-01-22T13:36:58.196605Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503296",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-220360",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:*:enterprise:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-135810",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219994",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:12.2.1.4.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-219817",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:6.4.0.0.0:enterprise:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503297",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-257324",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.0.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1503298",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence",
"product": {
"name": "business_intelligence",
"product_id": "CSAFPID-1650736",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence:7.6.0.0.0:*:*:*:enterprise:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765384",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764234",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765387",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.5.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764778",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764929",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764235",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764930",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:6.4.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764236",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503574",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-1503573",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765388",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764727",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764729",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_analytics_server___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765383",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765385",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765389",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_bi_platform_security___5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764725",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764728",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764730",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_presentation_services___7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-764726",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_service_administration_ui___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "business_intelligence_enterprise_edition",
"product": {
"name": "business_intelligence_enterprise_edition",
"product_id": "CSAFPID-765386",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:business_intelligence_enterprise_edition:_storage_service_integration___12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9197",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.3.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-9493",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:12.2.1.4.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220546",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-228391",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:5.9.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220545",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-220560",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "bi_publisher",
"product": {
"name": "bi_publisher",
"product_id": "CSAFPID-1673195",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:bi_publisher:7.6.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816763",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816761",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:6.4.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-816762",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:7.0.0.0.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751172",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:8.1.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1650735",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_7.8.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "analytics_desktop",
"product": {
"name": "analytics_desktop",
"product_id": "CSAFPID-1751157",
"product_identification_helper": {
"cpe": "cpe:2.3:a:oracle:analytics_desktop:prior_to_8.1.0:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "oracle"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2016-10000",
"references": [
{
"category": "self",
"summary": "CVE-2016-10000",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2016/CVE-2016-10000.json"
}
],
"title": "CVE-2016-10000"
},
{
"cve": "CVE-2020-2849",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-2849",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-2849.json"
}
],
"title": "CVE-2020-2849"
},
{
"cve": "CVE-2020-7760",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-7760",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-7760.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-7760"
},
{
"cve": "CVE-2020-13956",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-13956",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-13956.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-1503574",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2020-13956"
},
{
"cve": "CVE-2020-28975",
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2020-28975",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2020/CVE-2020-28975.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2020-28975"
},
{
"cve": "CVE-2021-23926",
"cwe": {
"id": "CWE-776",
"name": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of Recursive Entity References in DTDs (\u0027XML Entity Expansion\u0027)",
"title": "CWE-776"
},
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-23926",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-23926.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-220546",
"CSAFPID-9197",
"CSAFPID-764929",
"CSAFPID-764930"
]
}
],
"title": "CVE-2021-23926"
},
{
"cve": "CVE-2021-33813",
"cwe": {
"id": "CWE-611",
"name": "Improper Restriction of XML External Entity Reference"
},
"notes": [
{
"category": "other",
"text": "Improper Restriction of XML External Entity Reference",
"title": "CWE-611"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2021-33813",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2021/CVE-2021-33813.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9197",
"CSAFPID-9493",
"CSAFPID-228391",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-765383",
"CSAFPID-765384",
"CSAFPID-765385",
"CSAFPID-765386",
"CSAFPID-765387",
"CSAFPID-765388",
"CSAFPID-765389",
"CSAFPID-135810"
]
}
],
"title": "CVE-2021-33813"
},
{
"cve": "CVE-2022-40150",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2022-40150",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2022/CVE-2022-40150.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764234",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764235",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-764236",
"CSAFPID-9493",
"CSAFPID-764778",
"CSAFPID-228391",
"CSAFPID-135810",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2022-40150"
},
{
"cve": "CVE-2023-2976",
"cwe": {
"id": "CWE-552",
"name": "Files or Directories Accessible to External Parties"
},
"notes": [
{
"category": "other",
"text": "Files or Directories Accessible to External Parties",
"title": "CWE-552"
},
{
"category": "other",
"text": "Creation of Temporary File in Directory with Insecure Permissions",
"title": "CWE-379"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-2976",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-2976.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-2976"
},
{
"cve": "CVE-2023-4785",
"cwe": {
"id": "CWE-248",
"name": "Uncaught Exception"
},
"notes": [
{
"category": "other",
"text": "Uncaught Exception",
"title": "CWE-248"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-4785",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-4785.json"
}
],
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-7272",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-7272",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-7272.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-7272"
},
{
"cve": "CVE-2023-24998",
"cwe": {
"id": "CWE-404",
"name": "Improper Resource Shutdown or Release"
},
"notes": [
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "CWE-399",
"title": "CWE-399"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-764778",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-764725",
"CSAFPID-764726",
"CSAFPID-764727",
"CSAFPID-764728",
"CSAFPID-764729",
"CSAFPID-764730",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-24998",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-24998.json"
}
],
"title": "CVE-2023-24998"
},
{
"cve": "CVE-2023-25399",
"cwe": {
"id": "CWE-401",
"name": "Missing Release of Memory after Effective Lifetime"
},
"notes": [
{
"category": "other",
"text": "Missing Release of Memory after Effective Lifetime",
"title": "CWE-401"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-25399",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-25399.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-25399"
},
{
"cve": "CVE-2023-29824",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-29824",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-29824.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-29824"
},
{
"cve": "CVE-2023-32732",
"cwe": {
"id": "CWE-440",
"name": "Expected Behavior Violation"
},
"notes": [
{
"category": "other",
"text": "Expected Behavior Violation",
"title": "CWE-440"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-32732",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-32732.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-33202",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33202",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33202.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650735",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33202"
},
{
"cve": "CVE-2023-33953",
"cwe": {
"id": "CWE-834",
"name": "Excessive Iteration"
},
"notes": [
{
"category": "other",
"text": "Excessive Iteration",
"title": "CWE-834"
},
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
},
{
"category": "other",
"text": "Memory Allocation with Excessive Size Value",
"title": "CWE-789"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-33953",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-33953.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-43804",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-43804",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-43804.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-43804"
},
{
"cve": "CVE-2023-44487",
"cwe": {
"id": "CWE-400",
"name": "Uncontrolled Resource Consumption"
},
"notes": [
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-44487",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-44487.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220545",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764235",
"CSAFPID-764236",
"CSAFPID-816761",
"CSAFPID-816762",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-45803",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-45803",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-45803.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-45803"
},
{
"cve": "CVE-2023-50782",
"cwe": {
"id": "CWE-208",
"name": "Observable Timing Discrepancy"
},
"notes": [
{
"category": "other",
"text": "Observable Timing Discrepancy",
"title": "CWE-208"
},
{
"category": "other",
"text": "Observable Discrepancy",
"title": "CWE-203"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2023-50782",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2023/CVE-2023-50782.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2023-50782"
},
{
"cve": "CVE-2024-0727",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-0727",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-0727.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574"
]
}
],
"title": "CVE-2024-0727"
},
{
"cve": "CVE-2024-1135",
"cwe": {
"id": "CWE-444",
"name": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)"
},
"notes": [
{
"category": "other",
"text": "Inconsistent Interpretation of HTTP Requests (\u0027HTTP Request/Response Smuggling\u0027)",
"title": "CWE-444"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-1135",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-1135.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-1135"
},
{
"cve": "CVE-2024-4741",
"cwe": {
"id": "CWE-416",
"name": "Use After Free"
},
"notes": [
{
"category": "other",
"text": "Use After Free",
"title": "CWE-416"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-4741",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-4741.json"
}
],
"title": "CVE-2024-4741"
},
{
"cve": "CVE-2024-5535",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "other",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "other",
"text": "Dependency on Vulnerable Third-Party Component",
"title": "CWE-1395"
}
],
"product_status": {
"known_affected": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-5535",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-5535.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.1,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-135810",
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-5535"
},
{
"cve": "CVE-2024-7254",
"cwe": {
"id": "CWE-20",
"name": "Improper Input Validation"
},
"notes": [
{
"category": "other",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "other",
"text": "Uncontrolled Recursion",
"title": "CWE-674"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-7254",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-7254.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.2,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-7254"
},
{
"cve": "CVE-2024-22195",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-22195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-22195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-22195"
},
{
"cve": "CVE-2024-26130",
"cwe": {
"id": "CWE-476",
"name": "NULL Pointer Dereference"
},
"notes": [
{
"category": "other",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
}
],
"product_status": {
"known_affected": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-26130",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-26130.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-9493",
"CSAFPID-220560",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-26130"
},
{
"cve": "CVE-2024-29025",
"cwe": {
"id": "CWE-770",
"name": "Allocation of Resources Without Limits or Throttling"
},
"notes": [
{
"category": "other",
"text": "Allocation of Resources Without Limits or Throttling",
"title": "CWE-770"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29025",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29025.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-29025"
},
{
"cve": "CVE-2024-29131",
"cwe": {
"id": "CWE-787",
"name": "Out-of-bounds Write"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-29131",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-29131.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-257324",
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-1650736"
]
}
],
"title": "CVE-2024-29131"
},
{
"cve": "CVE-2024-34064",
"cwe": {
"id": "CWE-79",
"name": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
}
],
"product_status": {
"known_affected": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-34064",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-34064.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-816763",
"CSAFPID-1503573",
"CSAFPID-765385",
"CSAFPID-764234",
"CSAFPID-764236",
"CSAFPID-1503574",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-34064"
},
{
"cve": "CVE-2024-35195",
"cwe": {
"id": "CWE-670",
"name": "Always-Incorrect Control Flow Implementation"
},
"notes": [
{
"category": "other",
"text": "Always-Incorrect Control Flow Implementation",
"title": "CWE-670"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-35195",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-35195.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.7,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-35195"
},
{
"cve": "CVE-2024-36114",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "other",
"text": "Out-of-bounds Write",
"title": "CWE-787"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-36114",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-36114.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.6,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-36114"
},
{
"cve": "CVE-2024-37891",
"cwe": {
"id": "CWE-669",
"name": "Incorrect Resource Transfer Between Spheres"
},
"notes": [
{
"category": "other",
"text": "Incorrect Resource Transfer Between Spheres",
"title": "CWE-669"
}
],
"product_status": {
"known_affected": [
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-37891",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-37891.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-37891"
},
{
"cve": "CVE-2024-38809",
"cwe": {
"id": "CWE-1333",
"name": "Inefficient Regular Expression Complexity"
},
"notes": [
{
"category": "other",
"text": "Inefficient Regular Expression Complexity",
"title": "CWE-1333"
},
{
"category": "other",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "other",
"text": "Uncontrolled Resource Consumption",
"title": "CWE-400"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38809",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38809.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.0,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.0/AV:N/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H",
"version": "3.0"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195",
"CSAFPID-1650736",
"CSAFPID-257324",
"CSAFPID-135810"
]
}
],
"title": "CVE-2024-38809"
},
{
"cve": "CVE-2024-38820",
"cwe": {
"id": "CWE-284",
"name": "Improper Access Control"
},
"notes": [
{
"category": "other",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "other",
"text": "Improper Handling of Case Sensitivity",
"title": "CWE-178"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-38820",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-38820.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-38820"
},
{
"cve": "CVE-2024-43382",
"cwe": {
"id": "CWE-311",
"name": "Missing Encryption of Sensitive Data"
},
"notes": [
{
"category": "other",
"text": "Missing Encryption of Sensitive Data",
"title": "CWE-311"
},
{
"category": "other",
"text": "Inadequate Encryption Strength",
"title": "CWE-326"
}
],
"product_status": {
"known_affected": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-43382",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-43382.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.9,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-220560",
"CSAFPID-1673195"
]
}
],
"title": "CVE-2024-43382"
},
{
"cve": "CVE-2024-47561",
"cwe": {
"id": "CWE-502",
"name": "Deserialization of Untrusted Data"
},
"notes": [
{
"category": "other",
"text": "Deserialization of Untrusted Data",
"title": "CWE-502"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2024-47561",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2024/CVE-2024-47561.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1650736",
"CSAFPID-257324"
]
}
],
"title": "CVE-2024-47561"
},
{
"cve": "CVE-2025-21532",
"product_status": {
"known_affected": [
"CSAFPID-1751157"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-21532",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-21532.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.8,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1751157"
]
}
],
"title": "CVE-2025-21532"
}
]
}
BDU:2023-05359
Vulnerability from fstec - Published: 15.06.2023{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Fedora Project, Wazuh, Inc, Google Inc",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "37 (Fedora), 38 (Fedora), 4.4.5 (Wazuh), \u0434\u043e 1.53.0 (gRPC)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u041a\u043e\u043c\u043f\u0435\u043d\u0441\u0438\u0440\u0443\u044e\u0449\u0438\u0435 \u043c\u0435\u0440\u044b:\n- \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0430\u043d\u0442\u0438\u0432\u0438\u0440\u0443\u0441\u043d\u044b\u0445 \u0441\u0440\u0435\u0434\u0441\u0442\u0432 \u0437\u0430\u0449\u0438\u0442\u044b;\n- \u043c\u043e\u043d\u0438\u0442\u043e\u0440\u0438\u043d\u0433 \u0434\u0435\u0439\u0441\u0442\u0432\u0438\u0439 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439;\n- \u0437\u0430\u043f\u0443\u0441\u043a \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 \u043e\u0442 \u0438\u043c\u0435\u043d\u0438 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f \u0441 \u043c\u0438\u043d\u0438\u043c\u0430\u043b\u044c\u043d\u044b\u043c\u0438 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0432 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u0435;\n- \u043f\u0440\u0438\u043c\u0435\u043d\u0435\u043d\u0438\u0435 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0438\u044f \u0438 \u043f\u0440\u0435\u0434\u043e\u0442\u0432\u0440\u0430\u0449\u0435\u043d\u0438\u044f \u0432\u0442\u043e\u0440\u0436\u0435\u043d\u0438\u0439.\n\n\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\n\u0414\u043b\u044f GRPC:\nhttps://github.com/grpc/grpc/pull/32309\n\n\u0414\u043b\u044f Fedora:\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.06.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "08.09.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "08.09.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-05359",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-32732",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0430\u0440\u0445\u0438\u0442\u0435\u043a\u0442\u0443\u0440\u044b",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "Fedora, Wazuh, gRPC",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Fedora Project Fedora 37 , Fedora Project Fedora 38 ",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0437\u043e\u0432\u0430 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440 Google gRPC, \u0441\u0432\u044f\u0437\u0430\u043d\u043d\u0430\u044f \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0439, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u043e\u0436\u0438\u0434\u0430\u0435\u043c\u043e\u0433\u043e \u043f\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f (CWE-440)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u0433\u043e \u0432\u044b\u0437\u043e\u0432\u0430 \u043f\u0440\u043e\u0446\u0435\u0434\u0443\u0440 Google gRPC \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u043e\u0439 \u0432\u0432\u043e\u0434\u0438\u043c\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u043d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u043e\u0439 \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0435\u0439 \u0444\u0443\u043d\u043a\u0446\u0438\u0439. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://github.com/grpc/grpc/pull/32309\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/\nhttps://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/\nhttps://vuldb.com/?id.231160",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430, \u041f\u0440\u0438\u043a\u043b\u0430\u0434\u043d\u043e\u0435 \u041f\u041e \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-440",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 5,3)"
}
FKIE_CVE-2023-32732
Vulnerability from fkie_nvd - Published: 2023-06-09 11:15 - Updated: 2025-02-13 17:165.3 (Medium) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
| URL | Tags | ||
|---|---|---|---|
| cve-coordination@google.com | https://github.com/grpc/grpc/pull/32309 | Issue Tracking, Patch | |
| cve-coordination@google.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/ | Mailing List | |
| cve-coordination@google.com | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://github.com/grpc/grpc/pull/32309 | Issue Tracking, Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/ | Mailing List | |
| af854a3a-2127-422b-91ae-364da2661108 | https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/ | Mailing List |
| Vendor | Product | Version | |
|---|---|---|---|
| grpc | grpc | * | |
| fedoraproject | fedora | 37 | |
| fedoraproject | fedora | 38 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*",
"matchCriteriaId": "97BFBCEF-3DA4-4DD4-881F-5F3940614E30",
"versionEndExcluding": "1.53.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"matchCriteriaId": "E30D0E6F-4AE8-4284-8716-991DFA48CC5D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"matchCriteriaId": "CC559B26-5DFC-4B7A-A27C-B77DE755DFF9",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url"
},
{
"lang": "es",
"value": "gRPC contiene una vulnerabilidad por la que un cliente puede provocar la finalizaci\u00f3n de la conexi\u00f3n entre un proxy HTTP2 y un servidor gRPC. Un error de codificaci\u00f3n en base64 para cabeceras con sufijo \"-bin\" provocar\u00e1 la desconexi\u00f3n por parte del servidor gRPC, pero suele estar permitido por los proxies HTTP2. Se recomienda actualizar m\u00e1s all\u00e1 del commit \"https://github.com/grpc/grpc/pull/32309\"."
}
],
"id": "CVE-2023-32732",
"lastModified": "2025-02-13T17:16:32.953",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2023-06-09T11:15:09.377",
"references": [
{
"source": "cve-coordination@google.com",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"source": "cve-coordination@google.com",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
}
],
"sourceIdentifier": "cve-coordination@google.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-440"
}
],
"source": "cve-coordination@google.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
SUSE-SU-2024:0573-1
Vulnerability from csaf_suse - Published: 2024-02-21 08:37 - Updated: 2024-02-21 08:37| URL | Category | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2 fixes the following issues:\n\nabseil-cpp was updated to:\n\nUpdate to 20230802.1:\n\n* Add StdcppWaiter to the end of the list of waiter implementations\n\nUpdate to 20230802.0\n\n What\u0027s New:\n\n * Added the nullability library for designating the expected\n nullability of pointers. Currently these serve as annotations\n only, but it is expected that compilers will one day be able\n to use these annotations for diagnostic purposes.\n * Added the prefetch library as a portable layer for moving data\n into caches before it is read.\n * Abseil\u0027s hash tables now detect many more programming errors\n in debug and sanitizer builds.\n * Abseil\u0027s synchronization objects now differentiate absolute\n waits (when passed an absl::Time) from relative waits (when\n passed an absl::Duration) when the underlying platform supports\n differentiating these cases. This only makes a difference when\n system clocks are adjusted.\n * Abseil\u0027s flag parsing library includes additional methods that\n make it easier to use when another library also expects to be\n able to parse flags.\n * absl::string_view is now available as a smaller target,\n @com_google_absl//absl/strings:string_view, so that users may\n use this library without depending on the much larger\n @com_google_absl//absl/strings target.\n\nUpdate to 20230125.3\n\nDetails can be found on:\n\n https://github.com/abseil/abseil-cpp/releases/tag/20230125.3\n\nUpdate to 20230125.2\n\nWhat\u0027s New:\n\n The Abseil logging library has been released. This library\n provides facilities for writing short text messages about the\n status of a program to stderr, disk files, or other sinks\n (via an extension API). See the logging library documentation\n for more information.\n An extension point, AbslStringify(), allows user-defined types\n to seamlessly work with Abseil\u0027s string formatting functions\n like absl::StrCat() and absl::StrFormat().\n A library for computing CRC32C checksums has been added.\n Floating-point parsing now uses the Eisel-Lemire algorithm,\n which provides a significant speed improvement.\n The flags library now provides suggestions for the closest\n flag(s) in the case of misspelled flags.\n Using CMake to install Abseil now makes the installed artifacts\n (in particular absl/base/options.h) reflect the compiled ABI.\n\n Breaking Changes:\n\n Abseil now requires at least C++14 and follows Google\u0027s Foundational\n C++ Support Policy. See this table for a list of currently supported\n versions compilers, platforms, and build tools.\n The legacy spellings of the thread annotation macros/functions\n (e.g. GUARDED_BY()) have been removed by default in favor of the\n ABSL_ prefixed versions (e.g. ABSL_GUARDED_BY()) due to clashes with\n other libraries. The compatibility macro ABSL_LEGACY_THREAD_ANNOTATIONS\n can be defined on the compile command-line to temporarily restore these\n spellings, but this compatibility macro will be removed in the future.\n\n Known Issues\n\n The Abseil logging library in this release is not a feature-complete\n replacement for glog yet. VLOG and DFATAL are examples of features\n that have not yet been released.\n\nUpdate to version 20220623.0\n\n What\u0027s New:\n\n * Added absl::AnyInvocable, a move-only function type.\n * Added absl::CordBuffer, a type for buffering data for eventual inclusion an\n absl::Cord, which is useful for writing zero-copy code.\n * Added support for command-line flags of type absl::optional\u003cT\u003e.\n\n Breaking Changes:\n\n * CMake builds now use the flag ABSL_BUILD_TESTING (default: OFF) to control\n whether or not unit tests are built.\n * The ABSL_DEPRECATED macro now works with the GCC compiler. GCC users that\n are experiencing new warnings can use -Wno-deprecated-declatations silence\n\tthe warnings or use -Wno-error=deprecated-declarations to see warnings but\n\tnot fail the build.\n * ABSL_CONST_INIT uses the C++20 keyword constinit when available. Some\n compilers are more strict about where this keyword must appear compared to\n\tthe pre-C++20 implementation.\n * Bazel builds now depend on the bazelbuild/bazel-skylib repository.\n See Abseil\u0027s WORKSPACE file for an example of how to add this dependency.\n\n Other:\n\n * This will be the last release to support C++11. Future releases will require at least C++14.\n\ngrpc was updated to 1.60:\n\nUpdate to release 1.60\n\n* Implemented dualstack IPv4 and IPv6 backend support, as per\n draft gRFC A61. xDS support currently guarded by\n GRPC_EXPERIMENTAL_XDS_DUALSTACK_ENDPOINTS env var.\n* Support for setting proxy for addresses.\n* Add v1 reflection.\n\nupdate to 1.59.3:\n\n* Security - Revocation: Crl backport to 1.59. (#34926)\n\nUpdate to release 1.59.2\n\n* Fixes for CVE-2023-44487\n\nUpdate to version 1.59.1:\n\n* C++: Fix MakeCordFromSlice memory bug (gh#grpc/grpc#34552).\n\nUpdate to version 1.59.0:\n\n* xds ssa: Remove environment variable protection for stateful\n affinity (gh#grpc/grpc#34435).\n* c-ares: fix spin loop bug when c-ares gives up on a socket\n that still has data left in its read buffer\n (gh#grpc/grpc#34185).\n* Deps: Adding upb as a submodule (gh#grpc/grpc#34199).\n* EventEngine: Update Cancel contract on closure deletion\n timeline (gh#grpc/grpc#34167).\n* csharp codegen: Handle empty base_namespace option value to\n fix gh#grpc/grpc#34113 (gh#grpc/grpc#34137).\n* Ruby:\n - replace strdup with gpr_strdup (gh#grpc/grpc#34177).\n - drop ruby 2.6 support (gh#grpc/grpc#34198).\n\nUpdate to release 1.58.1\n\n* Reintroduced c-ares 1.14 or later support\n\nUpdate to release 1.58\n\n* ruby extension: remove unnecessary background thread startup\n wait logic that interferes with forking\n\nUpdate to release 1.57 (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)\n\n* EventEngine: Change GetDNSResolver to return\n absl::StatusOr\u003cstd::unique_ptr\u003cDNSResolver\u003e\u003e.\n* Improve server handling of file descriptor exhaustion.\n* Add a channel argument to set DSCP on streams.\n\nUpdate to release 1.56.2\n\n* Improve server handling of file descriptor exhaustion\n\nUpdate to release 1.56.0 (CVE-2023-32731, bsc#1212180)\n\n* core: Add support for vsock transport.\n* EventEngine: Change TXT lookup result type to\n std::vector\u003cstd::string\u003e.\n* C++/Authz: support customizable audit functionality for\n authorization policy.\n\nUpdate to release 1.54.1\n\n* Bring declarations and definitions to be in sync\n\nUpdate to release 1.54 (CVE-2023-32732, bsc#1212182)\n\n* XDS: enable XDS federation by default\n* TlsCreds: Support revocation of intermediate in chain\n\nUpdate to release 1.51.1\n\n* Only a macOS/aarch64-related change\n\nUpdate to release 1.51\n\n* c-ares DNS resolver: fix logical race between resolution\n timeout/cancellation and fd readability.\n* Remove support for pthread TLS\n\nUpdate to release 1.50.0\n\n* Core\n\n - Derive EventEngine from std::enable_shared_from_this. (#31060)\n - Revert \u0027Revert \u0027[chttp2] fix stream leak with queued flow control\n update and absence of writes (#30907)\u0027 (#30991)\u0027. (#30992)\n - [chttp2] fix stream leak with queued flow control update and absence of writes. (#30907)\n - Remove gpr_codegen. (#30899)\n - client_channel: allow LB policy to communicate update errors to resolver. (#30809)\n - FaultInjection: Fix random number generation. (#30623)\n\n* C++\n\n - OpenCensus Plugin: Add measure and views for started RPCs. (#31034)\n\n* C#\n\n - Grpc.Tools: Parse warnings from libprotobuf (fix #27502). (#30371)\n - Grpc.Tools add support for env variable GRPC_PROTOC_PLUGIN (fix #27099). (#30411)\n - Grpc.Tools document AdditionalImportDirs. (#30405)\n - Fix OutputOptions and GrpcOutputOptions (issue #25950). (#30410)\n\nUpdate to release 1.49.1\n\n* All\n\n - Update protobuf to v21.6 on 1.49.x. (#31028)\n\n* Ruby\n\n - Backport \u0027Fix ruby windows ucrt build #31051\u0027 to 1.49.x. (#31053)\n\nUpdate to release 1.49.0\n\n* Core\n - Backport: \u0027stabilize the C2P resolver URI scheme\u0027 to v1.49.x. (#30654)\n - Bump core version. (#30588)\n - Update OpenCensus to HEAD. (#30567)\n - Update protobuf submodule to 3.21.5. (#30548)\n - Update third_party/protobuf to 3.21.4. (#30377)\n - [core] Remove GRPC_INITIAL_METADATA_CORKED flag. (#30443)\n - HTTP2: Fix keepalive time throttling. (#30164)\n - Use AnyInvocable in EventEngine APIs. (#30220)\n\n* Python\n\n - Add type stub generation support to grpcio-tools. (#30498)\n\nUpdate to release 1.48.1\n\n* Backport EventEngine Forkables\n\nUpdate to release 1.48.0\n \n* C++14 is now required\n* xDS: Workaround to get gRPC clients working with istio\n\nUpdate to release 1.46.3\n\n* backport: xds: use federation env var to guard new-style\n resource name parsing (#29725) #29727\n\nUpdate to release 1.46\n\n* Added HTTP/1.1 support in httpcli\n* HTTP2: Add graceful goaway\n\nUpdate to release 1.45.2\n\n* Various fixes related to XDS\n* HTTP2: Should not run cancelling logic on servers when\n receiving GOAWAY\n\nUpdate to release 1.45.1\n\n* Switched to epoll1 as a default polling engine for Linux\n\nUpdate to version 1.45.0:\n\n* Core:\n\n - Backport \u0027Include ADS stream error in XDS error updates\n (#29014)\u0027 to 1.45.x [gh#grpc/grpc#29121].\n - Bump core version to 23.0.0 for upcoming release\n [gh#grpc/grpc#29026].\n - Fix memory leak in HTTP request security handshake\n cancellation [gh#grpc/grpc#28971].\n - CompositeChannelCredentials: Comparator implementation\n [gh#grpc/grpc#28902].\n - Delete custom iomgr [gh#grpc/grpc#28816].\n - Implement transparent retries [gh#grpc/grpc#28548].\n - Uniquify channel args keys [gh#grpc/grpc#28799].\n - Set trailing_metadata_available for recv_initial_metadata\n ops when generating a fake status [gh#grpc/grpc#28827].\n - Eliminate gRPC insecure build [gh#grpc/grpc#25586].\n - Fix for a racy WorkSerializer shutdown [gh#grpc/grpc#28769].\n - InsecureCredentials: singleton object [gh#grpc/grpc#28777].\n - Add http cancel api [gh#grpc/grpc#28354].\n - Memory leak fix on windows in grpc_tcp_create()\n [gh#grpc/grpc#27457].\n - xDS: Rbac filter updates [gh#grpc/grpc#28568].\n\n* C++\n\n - Bump the minimum gcc to 5 [gh#grpc/grpc#28786].\n - Add experimental API for CRL checking support to gRPC C++\n TlsCredentials [gh#grpc/grpc#28407].\n\nUpdate to release 1.44.0\n\n* Add a trace to list which filters are contained in a\n channel stack.\n* Remove grpc_httpcli_context.\n* xDS: Add support for RBAC HTTP filter.\n* API to cancel grpc_resolve_address.\n\nUpdate to version 1.43.2:\n\n* Fix google-c2p-experimental issue (gh#grpc/grpc#28692).\n\nChanges from version 1.43.0:\n\n* Core:\n\n - Remove redundant work serializer usage in c-ares windows\n code (gh#grpc/grpc#28016).\n - Support RDS updates on the server (gh#grpc/grpc#27851).\n - Use WorkSerializer in XdsClient to propagate updates in a\n synchronized manner (gh#grpc/grpc#27975).\n - Support Custom Post-handshake Verification in TlsCredentials\n (gh#grpc/grpc#25631).\n - Reintroduce the EventEngine default factory\n (gh#grpc/grpc#27920).\n - Assert Android API \u003e= v21 (gh#grpc/grpc#27943).\n - Add support for abstract unix domain sockets\n (gh#grpc/grpc#27906).\n* C++:\n\n - OpenCensus: Move metadata storage to arena\n (gh#grpc/grpc#27948).\n\n* [C#] Add nullable type attributes to Grpc.Core.Api\n (gh#grpc/grpc#27887).\n- Update package name libgrpc++1 to libgrpc++1_43 in keeping with\n updated so number.\n\nUpdate to release 1.41.0\n\n* xDS: Remove environmental variable guard for security.\n* xDS Security: Use new way to fetch certificate provider\n plugin instance config.\n* xDS server serving status: Use a struct to allow more fields\n to be added in the future.\n\nUpdate to release 1.39.1\n\n* Fix C# protoc plugin argument parsing on 1.39.x\n\nUpdate to version 1.39.0:\n\n* Core\n\n - Initialize tcp_posix for CFStream when needed\n (gh#grpc/grpc#26530).\n - Update boringssl submodule (gh#grpc/grpc#26520).\n - Fix backup poller races (gh#grpc/grpc#26446).\n - Use default port 443 in HTTP CONNECT request\n (gh#grpc/grpc#26331).\n* C++\n\n - New iomgr implementation backed by the EventEngine API\n (gh#grpc/grpc#26026).\n - async_unary_call: add a Destroy method, called by\n std::default_delete (gh#grpc/grpc#26389).\n - De-experimentalize C++ callback API (gh#grpc/grpc#25728).\n\n* PHP: stop reading composer.json file just to read the version\n string (gh#grpc/grpc#26156).\n\n* Ruby: Set XDS user agent in ruby via macros\n (gh#grpc/grpc#26268).\n\nUpdate to release 1.38.0\n\n* Invalidate ExecCtx now before computing timeouts in all\n repeating timer events using a WorkSerializer or combiner.\n* Fix use-after-unref bug in fault_injection_filter\n* New gRPC EventEngine Interface\n* Allow the AWS_DEFAULT_REGION environment variable\n* s/OnServingStatusChange/OnServingStatusUpdate/\n\nUpdate to release 1.37.1\n\n* Use URI form of address for channelz listen node\n* Implementation CSDS (xDS Config Dump)\n* xDS status notifier\n* Remove CAS loops in global subchannel pool and simplify\n subchannel refcounting\n\nUpdate to release 1.36.4\n\n* A fix for DNS SRV lookups on Windows\n\nUpdate to 1.36.1:\n\n* Core:\n * Remove unnecessary internal pollset set in c-ares DNS resolver\n * Support Default Root Certs in Tls Credentials\n * back-port: add env var protection for google-c2p resolver\n* C++:\n * Move third party identity C++ api out of experimental namespace\n * refactor!: change error_details functions to templates\n * Support ServerContext for callback API\n* PHP:\n * support for PSM security\n * fixed segfault on reused call object\n * fixed phpunit 8 warnings\n* Python:\n * Implement Python Client and Server xDS Creds\n\nUpdate to version 1.34.1:\n\n* Backport \u0027Lazily import grpc_tools when using runtime\n stub/message generation\u0027 to 1.34.x (gh#grpc/grpc#25011).\n* Backport \u0027do not use \u003cPublicSign\u003etrue\u003c/PublicSign\u003e on\n non-windows\u0027 to 1.34.x (gh#grpc/grpc#24995).\n\nUpdate to version 1.34.0:\n\n* Core:\n\n- Protect xds security code with the environment variable\n \u0027GRPC_XDS_EXPERIMENTAL_SECURITY_SUPPORT\u0027\n (gh#grpc/grpc#24782).\n - Add support for \u0027unix-abstract:\u0027 URIs to support abstract\n unix domain sockets (gh#grpc/grpc#24500).\n - Increment Index when parsing not plumbed SAN fields\n (gh#grpc/grpc#24601).\n - Revert \u0027Revert \u0027Deprecate\n GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS\u0027\u0027\n (gh#grpc/grpc#24518).\n - xds: Set status code to INVALID_ARGUMENT when NACKing\n (gh#grpc/grpc#24516).\n - Include stddef.h in address_sorting.h (gh#grpc/grpc#24514).\n - xds: Add support for case_sensitive option in RouteMatch\n (gh#grpc/grpc#24381).\n* C++:\n - Fix --define=grpc_no_xds=true builds (gh#grpc/grpc#24503).\n - Experimental support and tests for\n CreateCustomInsecureChannelWithInterceptorsFromFd\n (gh#grpc/grpc#24362).\n\nUpdate to release 1.33.2\n\n* Deprecate GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS.\n* Expose Cronet error message to the application layer.\n* Remove grpc_channel_ping from surface API.\n* Do not send BDP pings if there is no receive side activity.\n\nUpdate to version 1.33.1\n\n* Core\n\n - Deprecate\n GRPC_ARG_HTTP2_MIN_SENT_PING_INTERVAL_WITHOUT_DATA_MS\n (gh#grpc/grpc#24063).\n - Expose Cronet error message to the application layer\n (gh#grpc/grpc#24083).\n - Remove grpc_channel_ping from surface API\n (gh#grpc/grpc#23894).\n - Do not send BDP pings if there is no receive side activity\n (gh#grpc/grpc#22997).\n\n* C++\n\n - Makefile: only support building deps from submodule\n (gh#grpc/grpc#23957).\n\n- Add new subpackages - libupb and upb-devel. Currently, grpc\n sources include also upb sources. Before this change, libupb and\n upb-devel used to be included in a separate package - upb.\n\nUpdate to version 1.32.0:\n\n* Core\n - Remove stream from stalled lists on remove_stream\n (gh#grpc/grpc#23984).\n - Do not cancel RPC if send metadata size if larger than\n peer\u0027s limit (gh#grpc/grpc#23806).\n - Don\u0027t consider receiving non-OK status as an error for HTTP2\n (gh#grpc/grpc#19545).\n - Keepalive throttling (gh#grpc/grpc#23313).\n - Include the target_uri in \u0027target uri is not valid\u0027 error\n messages (gh#grpc/grpc#23782).\n - Fix \u0027cannot send compressed message large than 1024B\u0027 in\n cronet_transport (gh#grpc/grpc#23219).\n - Receive SETTINGS frame on clients before declaring\n subchannel READY (gh#grpc/grpc#23636).\n - Enabled GPR_ABSEIL_SYNC (gh#grpc/grpc#23372).\n - Experimental xDS v3 support (gh#grpc/grpc#23281).\n\n* C++\n\n - Upgrade bazel used for all tests to 2.2.0\n (gh#grpc/grpc#23902).\n - Remove test targets and test helper libraries from Makefile\n (gh#grpc/grpc#23813).\n - Fix repeated builds broken by re2\u0027s cmake\n (gh#grpc/grpc#23587).\n - Log the peer address of grpc_cli CallMethod RPCs to stderr\n (gh#grpc/grpc#23557).\n\nopencensus-proto was updated to 0.3.0+git.20200721:\n\n- Update to version 0.3.0+git.20200721:\n\n * Bump version to 0.3.0\n * Generate Go types using protocolbuffers/protobuf-go (#218)\n * Load proto_library() rule. (#216)\n\n- Update to version 0.2.1+git.20190826:\n\n * Remove grpc_java dependency and java_proto rules. (#214)\n * Add C++ targets, especially for gRPC services. (#212)\n * Upgrade bazel and dependencies to latest. (#211)\n * Bring back bazel cache to make CI faster. (#210)\n * Travis: don\u0027t require sudo for bazel installation. (#209)\n\n- Update to version 0.2.1:\n\n * Add grpc-gateway for metrics service. (#205)\n * Pin bazel version in travis builds (#207)\n * Update gen-go files (#199)\n * Add Web JS as a LibraryInfo.Language option (#198)\n * Set up Python packaging for PyPI release. (#197)\n * Add tracestate to links. (#191)\n * Python proto file generator and generated proto files (#196)\n * Ruby proto file generator and generated proto files (#192)\n * Add py_proto_library() rules for envoy/api. (#194)\n * Gradle: Upgrade dependency versions. (#193)\n * Update release versions for readme. (#189)\n * Start 0.3.0 development cycle\n * Update gen-go files. (#187)\n * Revert \u0027Start 0.3.0 development cycle (#167)\u0027 (#183)\n * Revert optimization for metric descriptor and bucket options for now. (#184)\n * Constant sampler: add option to always follow the parent\u0027s decision. (#182)\n * Document that all maximum values must be specified. (#181)\n * Fix typo in bucket bounds. (#178)\n * Restrict people who can approve reviews. This is to ensure code quality. (#177)\n * Use bazel cache to make CI faster. (#176)\n * Add grpc generated files to the idea plugin. (#175)\n * Add Resource to Span (#174)\n * time is required (#170)\n * Upgrade protobuf dependency to v3.6.1.3. (#173)\n * assume Ok Status when not set (#171)\n * Minor comments fixes (#160)\n * Start 0.3.0 development cycle (#167)\n * Update gen-go files. (#162)\n * Update releasing instruction. (#163)\n * Fix Travis build. (#165)\n * Add OpenApi doc for trace agent grpc-gateway (#157)\n * Add command to generate OpenApi/Swagger doc for grpc-gateway (#156)\n * Update gen-go files (#155)\n * Add trace export grpc-gateway config (#77)\n * Fix bazel build after bazel upgrade (#154)\n * README: Add gitter, javadoc and godoc badge. (#151)\n * Update release versions for README. (#150)\n * Start 0.2.0 development cycle\n * Add resource and metrics_service proto to mkgogen. Re-generate gen-go files. (#147)\n * Add resource to protocol (#137)\n * Fix generating the javadoc. (#144)\n * Metrics/TimeSeries: start time should not be included while end time should. (#142)\n * README: Add instructions on using opencensus_proto with Bazel. (#140)\n * agent/README: update package info. (#138)\n * Agent: Add metrics service. (#136)\n * Tracing: Add default limits to TraceConfig. (#133)\n * Remove a stale TODO. (#134)\n * README: Add a note about go_proto_library rules. (#135)\n * add golang bazel build support (#132)\n * Remove exporter protos from mkgogen. (#128)\n * Update README and RELEASING. (#130)\n * Change histogram buckets definition to be OpenMetrics compatible. (#121)\n * Remove exporter/v1 protos. (#124)\n * Clean up the README for Agent proto. (#126)\n * Change Quantiles to ValuesAtPercentile. (#122)\n * Extend the TraceService service to support export/config for multiple Applications. (#119)\n * Add specifications on Agent implementation details. (#112)\n * Update gitignore (#118)\n * Remove maven support. Not used. (#116)\n * Add gauge distribution. (#117)\n * Add support for Summary type and value. (#110)\n * Add Maven status and instructions on adding dependencies. (#115)\n * Bump version to 0.0.3-SNAPSHOT\n * Bump version to 0.0.2\n * Update gen-go files. (#114)\n * Gradle: Add missing source and javadoc rules. (#113)\n * Add support for float attributes. (#98)\n * Change from mean to sum in distribution. (#109)\n * Bump version to v0.0.2-SNAPSHOT\n * Bump version to v0.0.1\n * Add releasing instructions in RELEASING.md. (#106)\n * Add Gradle build rules for generating gRPC service and releasing to Maven. (#102)\n * Re-organize proto directory structure. (#103)\n * Update gen-go files. (#101)\n * Add a note about interceptors of other libraries. (#94)\n * agent/common/v1: use exporter_version, core_library_version in LibraryInfo (#100)\n * opencensus/proto: add default Agent port to README (#97)\n * Update the message names for Config RPC. (#93)\n * Add details about agent protocol in the README. (#88)\n * Update gen-go files. (#92)\n * agent/trace/v1: fix signature for Config and comments too (#91)\n * Update gen-go files. (#86)\n * Make tracestate a list instead of a map to preserve ordering. (#84)\n * Allow MetricDescriptor to be sent only the first time. (#78)\n * Update mkgogen.sh. (#85)\n * Add agent trace service proto definitions. (#79)\n * Update proto and gen-go package names. (#83)\n * Add agent/common proto and BUILD. (#81)\n * Add trace_config.proto. (#80)\n * Build exporters with maven. (#76)\n * Make clear that cumulative int/float can go only up. (#75)\n * Add tracestate field to the Span proto. (#74)\n * gradle wrapper --gradle-version 4.9 (#72)\n * Change from multiple types of timeseries to have one. (#71)\n * Move exemplars in the Bucket. (#70)\n * Update gen-go files. (#69)\n * Move metrics in the top level directory. (#68)\n * Remove Range from Distribution. No backend supports this. (#67)\n * Remove unused MetricSet message. (#66)\n * Metrics: Add Exemplar to DistributionValue. (#62)\n * Gauge vs Cumulative. (#65)\n * Clarifying comment about bucket boundaries. (#64)\n * Make MetricDescriptor.Type capture the type of the value as well. (#63)\n * Regenerate the Go artifacts (#61)\n * Add export service proto (#60)\n\n- Initial version 20180523\n\nprotobuf was updated to 25.1:\n\nupdate to 25.1:\n\n * Raise warnings for deprecated python syntax usages\n * Add support for extensions in CRuby, JRuby, and FFI Ruby\n * Add support for options in CRuby, JRuby and FFI (#14594)\n\nupdate to 25.0:\n\n * Implement proto2/proto3 with editions\n * Defines Protobuf compiler version strings as macros and\n separates out suffix string definition.\n * Add utf8_validation feature back to the global feature set.\n * Setting up version updater to prepare for poison pills and\n embedding version info into C++, Python and Java gencode.\n * Merge the protobuf and upb Bazel repos\n * Editions: Introduce functionality to protoc for generating\n edition feature set defaults.\n * Editions: Migrate edition strings to enum in C++ code.\n * Create a reflection helper for ExtensionIdentifier.\n * Editions: Provide an API for C++ generators to specify their\n features.\n * Editions: Refactor feature resolution to use an intermediate\n message.\n * Publish extension declarations with declaration\n verifications.\n * Editions: Stop propagating partially resolved feature sets to\n plugins.\n * Editions: Migrate string_field_validation to a C++ feature\n * Editions: Include defaults for any features in the generated\n pool.\n * Protoc: parser rejects explicit use of map_entry option\n * Protoc: validate that reserved range start is before end\n * Protoc: support identifiers as reserved names in addition to\n string literals (only in editions)\n * Drop support for Bazel 5.\n * Allow code generators to specify whether or not they support\n editions.\nC++:\n * Set `PROTOBUF_EXPORT` on\n `InternalOutOfLineDeleteMessageLite()`\n * Update stale checked-in files\n * Apply PROTOBUF_NOINLINE to declarations of some functions\n that want it.\n * Implement proto2/proto3 with editions\n * Make JSON UTF-8 boundary check inclusive of the largest\n possible UTF-8 character.\n * Reduce `Map::size_type` to 32-bits. Protobuf containers can\u0027t\n have more than that\n * Defines Protobuf compiler version strings as macros and\n separates out suffix string definition.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n oneof accessors.\n * Fix bug in reflection based Swap of map fields.\n * Add utf8_validation feature back to the global feature set.\n * Setting up version updater to prepare for poison pills and\n embedding version info into C++, Python and Java gencode.\n * Add prefetching to arena allocations.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n repeated and map field accessors.\n * Editions: Migrate edition strings to enum in C++ code.\n * Create a reflection helper for ExtensionIdentifier.\n * Editions: Provide an API for C++ generators to specify their\n features.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n string field accessors.\n * Editions: Refactor feature resolution to use an intermediate\n message.\n * Fixes for 32-bit MSVC.\n * Publish extension declarations with declaration\n verifications.\n * Export the constants in protobuf\u0027s any.h to support DLL\n builds.\n * Implement AbslStringify for the Descriptor family of types.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n message field accessors.\n * Editions: Stop propagating partially resolved feature sets to\n plugins.\n * Editions: Migrate string_field_validation to a C++ feature\n * Editions: Include defaults for any features in the generated\n pool.\n * Introduce C++ feature for UTF8 validation.\n * Protoc: validate that reserved range start is before end\n * Remove option to disable the table-driven parser in protoc.\n * Lock down ctype=CORD in proto file.\n * Support split repeated fields.\n * In OSS mode omit some extern template specializations.\n * Allow code generators to specify whether or not they support\n editions.\nJava:\n * Implement proto2/proto3 with editions\n * Remove synthetic oneofs from Java gencode field accessor\n tables.\n * Timestamps.parse: Add error handling for invalid\n hours/minutes in the timezone offset.\n * Defines Protobuf compiler version strings as macros and\n separates out suffix string definition.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n oneof accessors.\n * Add missing debugging version info to Protobuf Java gencode\n when multiple files are generated.\n * Fix a bad cast in putBuilderIfAbsent when already present due\n to using the result of put() directly (which is null if it\n currently has no value)\n * Setting up version updater to prepare for poison pills and\n embedding version info into C++, Python and Java gencode.\n * Fix a NPE in putBuilderIfAbsent due to using the result of\n put() directly (which is null if it currently has no value)\n * Update Kotlin compiler to escape package names\n * Add MapFieldBuilder and change codegen to generate it and the\n put{field}BuilderIfAbsent method.\n * Introduce recursion limit in Java text format parsing\n * Consider the protobuf.Any invalid if typeUrl.split(\u0027/\u0027)\n returns an empty array.\n * Mark `FieldDescriptor.hasOptionalKeyword()` as deprecated.\n * Fixed Python memory leak in map lookup.\n * Loosen upb for json name conflict check in proto2 between\n json name and field\n * Defines Protobuf compiler version strings as macros and\n separates out suffix string definition.\n * Add `ABSL_ATTRIBUTE_LIFETIME_BOUND` attribute on generated\n oneof accessors.\n * Ensure Timestamp.ToDatetime(tz) has correct offset\n * Do not check required field for upb python MergeFrom\n * Setting up version updater to prepare for poison pills and\n embedding version info into C++, Python and Java gencode.\n * Merge the protobuf and upb Bazel repos\n * Comparing a proto message with an object of unknown returns\n NotImplemented\n * Emit __slots__ in pyi output as a tuple rather than a list\n for --pyi_out.\n * Fix a bug that strips options from descriptor.proto in\n Python.\n * Raise warings for message.UnknownFields() usages and navigate\n to the new add\n * Add protobuf python keyword support in path for stub\n generator.\n * Add tuple support to set Struct\n * ### Python C-Extension (Default)\n * Comparing a proto message with an object of unknown returns\n NotImplemented\n * Check that ffi-compiler loads before using it to define\n tasks.\nUPB (Python/PHP/Ruby C-Extension):\n * Include .inc files directly instead of through a filegroup\n * Loosen upb for json name conflict check in proto2 between\n json name and field\n * Add utf8_validation feature back to the global feature set.\n * Do not check required field for upb python MergeFrom\n * Merge the protobuf and upb Bazel repos\n * Added malloc_trim() calls to Python allocator so RSS will\n decrease when memory is freed\n * Upb: fix a Python memory leak in ByteSize()\n * Support ASAN detection on clang\n * Upb: bugfix for importing a proto3 enum from within a proto2\n file\n * Expose methods needed by Ruby FFI using UPB_API\n * Fix `PyUpb_Message_MergeInternal` segfault\n\n- Build with source and target levels 8\n * fixes build with JDK21\n- Install the pom file with the new %%mvn_install_pom macro\n- Do not install the pom-only artifacts, since the %%mvn_install_pom\n macro resolves the variables at the install time\n\nupdate to 23.4:\n\n * Add dllexport_decl for generated default instance.\n * Deps: Update Guava to 32.0.1\n\nupdate to 23.3:\n\n C++:\n\n * Regenerate stale files\n * Use the same ABI for static and shared libraries on non-\n Windows platforms\n * Add a workaround for GCC constexpr bug\n Objective-C:\n * Regenerate stale files\n UPB (Python/PHP/Ruby C-Extension)\n * Fixed a bug in `upb_Map_Delete()` that caused crashes in\n map.delete(k) for Ruby when string-keyed maps were in use.\n\n Compiler:\n * Add missing header to Objective-c generator\n * Add a workaround for GCC constexpr bug\n\n Java:\n * Rollback of: Simplify protobuf Java message builder by\n removing methods that calls the super class only.\n\n Csharp:\n * [C#] Replace regex that validates descriptor names\n\nupdate to 22.5:\n\n C++:\n * Add missing cstdint header\n * Fix: missing -DPROTOBUF_USE_DLLS in pkg-config (#12700)\n * Avoid using string(JOIN..., which requires cmake 3.12\n * Explicitly include GTest package in examples\n * Bump Abseil submodule to 20230125.3 (#12660)\n\nupdate to 22.4:\n\n C++:\n * Fix libprotoc: export useful symbols from .so\n\n Python:\n * Fix bug in _internal_copy_files where the rule would fail in\n downstream repositories.\n\n Other:\n * Bump utf8_range to version with working pkg-config (#12584)\n * Fix declared dependencies for pkg-config\n * Update abseil dependency and reorder dependencies to ensure\n we use the version specified in protobuf_deps.\n * Turn off clang::musttail on i386\n\nupdate to v22.3\n\n UPB (Python/PHP/Ruby C-Extension):\n * Remove src prefix from proto import\n * Fix .gitmodules to use the correct absl branch\n * Remove erroneous dependency on googletest\n\nupdate to 22.2:\n\n Java:\n * Add version to intra proto dependencies and add kotlin stdlib\n dependency\n * Add $ back for osgi header\n * Remove $ in pom files\n\nupdate to 22.1:\n * Add visibility of plugin.proto to python directory\n * Strip \u0027src\u0027 from file name of plugin.proto\n * Add OSGi headers to pom files.\n * Remove errorprone dependency from kotlin protos.\n * Version protoc according to the compiler version number.\n\n- update to 22.0:\n\n * This version includes breaking changes to: Cpp.\n Please refer to the migration guide for information:\n https://protobuf.dev/support/migration/#compiler-22\n * [Cpp] Migrate to Abseil\u0027s logging library.\n * [Cpp] `proto2::Map::value_type` changes to `std::pair`.\n * [Cpp] Mark final ZeroCopyInputStream, ZeroCopyOutputStream,\n and DefaultFieldComparator classes.\n * [Cpp] Add a dependency on Abseil (#10416)\n * [Cpp] Remove all autotools usage (#10132)\n * [Cpp] Add C++20 reserved keywords\n * [Cpp] Dropped C++11 Support\n * [Cpp] Delete Arena::Init\n * [Cpp] Replace JSON parser with new implementation\n * [Cpp] Make RepeatedField::GetArena non-const in order to\n support split RepeatedFields.\n * long list of bindings specific fixes see\n https://github.com/protocolbuffers/protobuf/releases/tag/v22.0\n\nupdate to v21.12:\n\n* Python:\n * Fix broken enum ranges (#11171)\n * Stop requiring extension fields to have a sythetic oneof (#11091)\n * Python runtime 4.21.10 not works generated code can not load valid\n proto.\n\nupdate to 21.11:\n\n* Python:\n * Add license file to pypi wheels (#10936)\n * Fix round-trip bug (#10158)\n\nupdate to 21.10::\n\n* Java:\n * Use bit-field int values in buildPartial to skip work on unset groups of\n fields. (#10960)\n * Mark nested builder as clean after clear is called (#10984)\n\nupdate to 21.9:\n * Ruby:\n * Replace libc strdup usage with internal impl to restore musl compat (#10818)\n * Auto capitalize enums name in Ruby (#10454) (#10763)\n * Other:\n * Fix for grpc.tools #17995 \u0026 protobuf #7474 (handle UTF-8 paths in argumentfile) (#10721)\n * C++:\n * 21.x No longer define no_threadlocal on OpenBSD (#10743)\n * Java:\n * Mark default instance as immutable first to avoid race during static initialization of default instances (#10771)\n * Refactoring java full runtime to reuse sub-message builders and prepare to\n migrate parsing logic from parse constructor to builder.\n * Move proto wireformat parsing functionality from the private \u0027parsing\n constructor\u0027 to the Builder class.\n * Change the Lite runtime to prefer merging from the wireformat into mutable\n messages rather than building up a new immutable object before merging. This\n way results in fewer allocations and copy operations.\n * Make message-type extensions merge from wire-format instead of building up\n instances and merging afterwards. This has much better performance.\n * Fix TextFormat parser to build up recurring (but supposedly not repeated)\n sub-messages directly from text rather than building a new sub-message and\n merging the fully formed message into the existing field.\n\nupdate to 21.6:\n C++:\n * Reduce memory consumption of MessageSet parsing\n\nupdate to 21.5:\n\n PHP:\n * Added getContainingOneof and getRealContainingOneof to descriptor.\n * fix PHP readonly legacy files for nested messages\n\n Python:\n\n * Fixed comparison of maps in Python.\n\n- update to 21.4:\n\n * Reduce the required alignment of ArenaString from 8 to 4\n\n- update to 21.3:\n\n * C++:\n * Add header search paths to Protobuf-C++.podspec (#10024)\n * Fixed Visual Studio constinit errors (#10232)\n * Fix #9947: make the ABI compatible between debug and non-debug builds (#10271)\n * UPB:\n * Allow empty package names (fixes behavior regression in 4.21.0)\n * Fix a SEGV bug when comparing a non-materialized sub-message (#10208)\n * Fix several bugs in descriptor mapping containers (eg. descriptor.services_by_name)\n * for x in mapping now yields keys rather than values, to match Python\n conventions and the behavior of the old library.\n * Lookup operations now correctly reject unhashable types as map keys.\n * We implement repr() to use the same format as dict.\n * Fix maps to use the ScalarMapContainer class when appropriate\n * Fix bug when parsing an unknown value in a proto2 enum extension (protocolbuffers/upb#717)\n * PHP:\n * Add \u0027readonly\u0027 as a keyword for PHP and add previous classnames to descriptor pool (#10041)\n * Python:\n * Make //:protobuf_python and //:well_known_types_py_pb2 public (#10118)\n * Bazel:\n * Add back a filegroup for :well_known_protos (#10061)\n\nUpdate to 21.2:\n- C++:\n - cmake: Call get_filename_component() with DIRECTORY mode instead of PATH mode (#9614)\n - Escape GetObject macro inside protoc-generated code (#9739)\n - Update CMake configuration to add a dependency on Abseil (#9793)\n - Fix cmake install targets (#9822)\n - Use __constinit only in GCC 12.2 and up (#9936)\n- Java:\n - Update protobuf_version.bzl to separate protoc and per-language java \u2026 (#9900)\n- Python:\n - Increment python major version to 4 in version.json for python upb (#9926)\n - The C extension module for Python has been rewritten to use the upb library.\n - This is expected to deliver significant performance benefits, especially when\n parsing large payloads. There are some minor breaking changes, but these\n should not impact most users. For more information see:\n https://developers.google.com/protocol-buffers/docs/news/2022-05-06#python-updates\n- PHP:\n - [PHP] fix PHP build system (#9571)\n - Fix building packaged PHP extension (#9727)\n - fix: reserve \u0027ReadOnly\u0027 keyword for PHP 8.1 and add compatibility (#9633)\n - fix: phpdoc syntax for repeatedfield parameters (#9784)\n - fix: phpdoc for repeatedfield (#9783)\n - Change enum string name for reserved words (#9780)\n - chore: [PHP] fix phpdoc for MapField keys (#9536)\n - Fixed PHP SEGV by not writing to shared memory for zend_class_entry. (#9996)\n- Ruby:\n - Allow pre-compiled binaries for ruby 3.1.0 (#9566)\n - Implement respond_to? in RubyMessage (#9677)\n - [Ruby] Fix RepeatedField#last, #first inconsistencies (#9722)\n - Do not use range based UTF-8 validation in truffleruby (#9769)\n - Improve range handling logic of RepeatedField (#9799)\n- Other:\n - Fix invalid dependency manifest when using descriptor_set_out (#9647)\n - Remove duplicate java generated code (#9909)\n\n- Update to 3.20.1:\n\n - PHP:\n - Fix building packaged PHP extension (#9727)\n - Fixed composer.json to only advertise compatibility with\n PHP 7.0+. (#9819)\n - Ruby:\n - Disable the aarch64 build on macOS until it can be fixed. (#9816)\n - Other:\n - Fix versioning issues in 3.20.0\n\n- Update to 3.20.1:\n - Ruby:\n - Dropped Ruby 2.3 and 2.4 support for CI and releases.\n (#9311)\n - Added Ruby 3.1 support for CI and releases (#9566).\n - Message.decode/encode: Add recursion_limit option\n (#9218/#9486)\n - Allocate with xrealloc()/xfree() so message allocation is\n visible to the\n - Ruby GC. In certain tests this leads to much lower memory\n usage due to more\n - frequent GC runs (#9586).\n - Fix conversion of singleton classes in Ruby (#9342)\n - Suppress warning for intentional circular require (#9556)\n - JSON will now output shorter strings for double and float\n fields when possible\n - without losing precision.\n - Encoding and decoding of binary format will now work\n properly on big-endian\n - systems.\n - UTF-8 verification was fixed to properly reject surrogate\n code points.\n - Unknown enums for proto2 protos now properly implement\n proto2\u0027s behavior of\n - putting such values in unknown fields.\n - Java:\n - Revert \u0027Standardize on Array copyOf\u0027 (#9400)\n - Resolve more java field accessor name conflicts (#8198)\n - Fix parseFrom to only throw InvalidProtocolBufferException\n - InvalidProtocolBufferException now allows arbitrary wrapped\n Exception types.\n - Fix bug in FieldSet.Builder.mergeFrom\n - Flush CodedOutputStream also flushes underlying\n OutputStream\n - When oneof case is the same and the field type is Message,\n merge the\n - subfield. (previously it was replaced.)\u2019\n - Add @CheckReturnValue to some protobuf types\n - Report original exceptions when parsing JSON\n - Add more info to @deprecated javadoc for set/get/has\n methods\n - Fix initialization bug in doc comment line numbers\n - Fix comments for message set wire format.\n - Kotlin:\n - Add test scope to kotlin-test for protobuf-kotlin-lite\n (#9518)\n - Add orNull extensions for optional message fields.\n - Add orNull extensions to all proto3 message fields.\n - Python:\n - Dropped support for Python \u003c 3.7 (#9480)\n - Protoc is now able to generate python stubs (.pyi) with\n --pyi_out\n - Pin multibuild scripts to get manylinux1 wheels back\n (#9216)\n - Fix type annotations of some Duration and Timestamp\n methods.\n - Repeated field containers are now generic in field types\n and could be used in type annotations.\n - Protobuf python generated codes are simplified. Descriptors\n and message classes\u0027 definitions are now dynamic created in\n internal/builder.py.\n - Insertion Points for messages classes are discarded.\n - has_presence is added for FieldDescriptor in python\n - Loosen indexing type requirements to allow valid index()\n implementations rather than only PyLongObjects.\n - Fix the deepcopy bug caused by not copying\n message_listener.\n - Added python JSON parse recursion limit (default 100)\n - Path info is added for python JSON parse errors\n - Pure python repeated scalar fields will not able to pickle.\n Convert to list first.\n - Timestamp.ToDatetime() now accepts an optional tzinfo\n parameter. If specified, the function returns\n a timezone-aware datetime in the given time zone. If\n omitted or None, the function returns a timezone-naive UTC\n datetime (as previously).\n - Adds client_streaming and server_streaming fields to\n MethodDescriptor.\n - Add \u0027ensure_ascii\u0027 parameter to json_format.MessageToJson.\n This allows smaller JSON serializations with UTF-8 or other\n non-ASCII encodings.\n - Added experimental support for directly assigning numpy\n scalars and array.\n - Improve the calculation of public_dependencies in\n DescriptorPool.\n - [Breaking Change] Disallow setting fields to numpy\n singleton arrays or repeated fields to numpy\n multi-dimensional arrays. Numpy arrays should be indexed or\n flattened explicitly before assignment.\n - Compiler:\n - Migrate IsDefault(const std::string*) and\n UnsafeSetDefault(const std::string*)\n - Implement strong qualified tags for TaggedPtr\n - Rework allocations to power-of-two byte sizes.\n - Migrate IsDefault(const std::string*) and\n UnsafeSetDefault(const std::string*)\n - Implement strong qualified tags for TaggedPtr\n - Make TaggedPtr Set...() calls explicitly spell out the\n content type.\n - Check for parsing error before verifying UTF8.\n - Enforce a maximum message nesting limit of 32 in the\n descriptor builder to\n - guard against stack overflows\n - Fixed bugs in operators for RepeatedPtrIterator\n - Assert a maximum map alignment for allocated values\n - Fix proto1 group extension protodb parsing error\n - Do not log/report the same descriptor symbol multiple\n times if it contains\n - more than one invalid character.\n - Add UnknownFieldSet::SerializeToString and\n SerializeToCodedStream.\n - Remove explicit default pointers and deprecated API from\n protocol compiler\n - Arenas:\n - Change Repeated*Field to reuse memory when using arenas.\n - Implements pbarenaz for profiling proto arenas\n - Introduce CreateString() and CreateArenaString() for\n cleaner semantics\n - Fix unreferenced parameter for MSVC builds\n - Add UnsafeSetAllocated to be used for one-of string\n fields.\n - Make Arena::AllocateAligned() a public function.\n - Determine if ArenaDtor related code generation is\n necessary in one place.\n - Implement on demand register ArenaDtor for\n InlinedStringField\n - C++:\n - Enable testing via CTest (#8737)\n - Add option to use external GTest in CMake (#8736)\n - CMake: Set correct sonames for libprotobuf-lite.so and\n libprotoc.so (#8635) (#9529)\n - Add cmake option protobuf_INSTALL to not install files\n (#7123)\n - CMake: Allow custom plugin options e.g. to generate mocks\n (#9105)\n - CMake: Use linker version scripts (#9545)\n - Manually *struct Cord fields to work better with arenas.\n - Manually destruct map fields.\n - Generate narrower code\n - Fix #9378 by removing\n - shadowed cached_size field\n - Remove GetPointer() and explicit nullptr defaults.\n - Add proto_h flag for speeding up large builds\n - Add missing overload for reference wrapped fields.\n - Add MergedDescriptorDatabase::FindAllFileNames()\n - RepeatedField now defines an iterator type instead of\n using a pointer.\n - Remove obsolete macros GOOGLE_PROTOBUF_HAS_ONEOF and\n GOOGLE_PROTOBUF_HAS_ARENAS.\n - PHP:\n - Fix: add missing reserved classnames (#9458)\n - PHP 8.1 compatibility (#9370)\n - C#:\n - Fix trim warnings (#9182)\n - Fixes NullReferenceException when accessing\n FieldDescriptor.IsPacked (#9430)\n - Add ToProto() method to all descriptor classes (#9426)\n - Add an option to preserve proto names in JsonFormatter\n (#6307)\n - Objective-C:\n - Add prefix_to_proto_package_mappings_path option. (#9498)\n - Rename proto_package_to_prefix_mappings_path to\n package_to_prefix_mappings_path. (#9552)\n - Add a generation option to control use of forward\n declarations in headers. (#9568)\n\n- update to 3.19.4:\n Python:\n * Make libprotobuf symbols local on OSX to fix issue #9395 (#9435)\n Ruby:\n * Fixed a data loss bug that could occur when the number of optional fields\n in a message is an exact multiple of 32\n PHP:\n * Fixed a data loss bug that could occur when the number of optional fields\n in a message is an exact multiple of 32.\n\n- Update to 3.19.3:\n C++:\n * Make proto2::Message::DiscardUnknownFields() non-virtual\n * Separate RepeatedPtrField into its own header file\n * For default floating point values of 0, consider all bits significant\n * Fix shadowing warnings\n * Fix for issue #8484, constant initialization doesn\u0027t compile in msvc clang-cl environment\n Java:\n * Improve performance characteristics of UnknownFieldSet parsing\n * For default floating point values of 0, consider all bits significant\n * Annotate //java/com/google/protobuf/util/... with nullness annotations\n * Use ArrayList copy constructor\n Bazel:\n * Ensure that release archives contain everything needed for Bazel\n * Align dependency handling with Bazel best practices\n Javascript:\n * Fix ReferenceError: window is not defined when getting the global object\n Ruby:\n * Fix memory leak in MessageClass.encode\n * Override Map.clone to use Map\u0027s dup method\n * Ruby: build extensions for arm64-darwin\n * Add class method Timestamp.from_time to ruby well known types\n * Adopt pure ruby DSL implementation for JRuby\n * Add size to Map class\n * Fix for descriptor_pb.rb: google/protobuf should be required first\n Python:\n * Proto2 DecodeError now includes message name in error message\n * Make MessageToDict convert map keys to strings\n * Add python-requires in setup.py\n * Add python 3.10\n\n- Update to 3.17.3:\n C++\n * Introduce FieldAccessListener.\n * Stop emitting boilerplate {Copy/Merge}From in each ProtoBuf class\n * Provide stable versions of SortAndUnique().\n * Make sure to cache proto3 optional message fields when they are cleared.\n * Expose UnsafeArena methods to Reflection.\n * Use std::string::empty() rather than std::string::size() \u003e 0.\n * [Protoc] C++ Resolved an issue where NO_DESTROY and CONSTINIT are in incorrect order (#8296)\n * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)\n * Delete StringPiecePod (#8353)\n * Create a CMake option to control whether or not RTTI is enabled (#8347)\n * Make util::Status more similar to absl::Status (#8405)\n * The ::pb namespace is no longer exposed due to conflicts.\n * Allow MessageDifferencer::TreatAsSet() (and friends) to override previous\n calls instead of crashing.\n * Reduce the size of generated proto headers for protos with string or\n bytes fields.\n * Move arena() operation on uncommon path to out-of-line routine\n * For iterator-pair function parameter types, take both iterators by value.\n * Code-space savings and perhaps some modest performance improvements in\n * RepeatedPtrField.\n * Eliminate nullptr check from every tag parse.\n * Remove unused _$name$cached_byte_size fields.\n * Serialize extension ranges together when not broken by a proto field in the\n middle.\n * Do out-of-line allocation and deallocation of string object in ArenaString.\n * Streamline ParseContext::ParseMessage to avoid code bloat and improve\n performance.\n * New member functions RepeatedField::Assign, RepeatedPtrField::{Add, Assign}.\n on an error path.\n * util::DefaultFieldComparator will be final in a future version of protobuf.\n * Subclasses should inherit from SimpleFieldComparator instead.\n Kotlin\n * Introduce support for Kotlin protos (#8272)\n * Restrict extension setter and getter operators to non-nullable T.\n Java\n * Fixed parser to check that we are at a proper limit when a sub-message has\n finished parsing.\n * updating GSON and Guava to more recent versions (#8524)\n * Reduce the time spent evaluating isExtensionNumber by storing the extension\n ranges in a TreeMap for faster queries. This is particularly relevant for\n protos which define a large number of extension ranges, for example when\n each tag is defined as an extension.\n * Fix java bytecode estimation logic for optional fields.\n * Optimize Descriptor.isExtensionNumber.\n * deps: update JUnit and Truth (#8319)\n * Detect invalid overflow of byteLimit and return InvalidProtocolBufferException as documented.\n * Exceptions thrown while reading from an InputStream in parseFrom are now\n included as causes.\n * Support potentially more efficient proto parsing from RopeByteStrings.\n * Clarify runtime of ByteString.Output.toStringBuffer().\n * Added UnsafeByteOperations to protobuf-lite (#8426)\n Python:\n * Add MethodDescriptor.CopyToProto() (#8327)\n * Remove unused python_protobuf.{cc,h} (#8513)\n * Start publishing python aarch64 manylinux wheels normally (#8530)\n * Fix constness issue detected by MSVC standard conforming mode (#8568)\n * Make JSON parsing match C++ and Java when multiple fields from the same\n oneof are present and all but one is null.\n * Fix some constness / char literal issues being found by MSVC standard conforming mode (#8344)\n * Switch on \u0027new\u0027 buffer API (#8339)\n * Enable crosscompiling aarch64 python wheels under dockcross manylinux docker image (#8280)\n * Fixed a bug in text format where a trailing colon was printed for repeated field.\n * When TextFormat encounters a duplicate message map key, replace the current\n one instead of merging.\n Ruby:\n * Add support for proto3 json_name in compiler and field definitions (#8356)\n * Fixed memory leak of Ruby arena objects. (#8461)\n * Fix source gem compilation (#8471)\n * Fix various exceptions in Ruby on 64-bit Windows (#8563)\n * Fix crash when calculating Message hash values on 64-bit Windows (#8565)\n General:\n * Support M1 (#8557)\n\nUpdate to 3.15.8:\n - Fixed memory leak of Ruby arena objects (#8461)\n\nUpdate to 3.15.7:\n\n C++:\n * Remove the ::pb namespace (alias) (#8423)\n Ruby:\n * Fix unbounded memory growth for Ruby \u003c2.7 (#8429)\n * Fixed message equality in cases where the message type is different (#8434)\n\nupdate to 3.15.6:\n\n Ruby:\n * Fixed bug in string comparison logic (#8386)\n * Fixed quadratic memory use in array append (#8379)\n * Fixed SEGV when users pass nil messages (#8363)\n * Fixed quadratic memory usage when appending to arrays (#8364)\n * Ruby \u003c2.7 now uses WeakMap too, which prevents memory leaks. (#8341)\n * Fix for FieldDescriptor.get(msg) (#8330)\n * Bugfix for Message.[] for repeated or map fields (#8313)\n PHP:\n * read_property() handler is not supposed to return NULL (#8362)\n Protocol Compiler\n * Optional fields for proto3 are enabled by default, and no longer require\n the --experimental_allow_proto3_optional flag.\n C++:\n * Do not disable RTTI by default in the CMake build (#8377)\n * Create a CMake option to control whether or not RTTI is enabled (#8361)\n * Fix PROTOBUF_CONSTINIT macro redefinition (#8323)\n * MessageDifferencer: fixed bug when using custom ignore with multiple\n unknown fields\n * Use init_seg in MSVC to push initialization to an earlier phase.\n * Runtime no longer triggers -Wsign-compare warnings.\n * Fixed -Wtautological-constant-out-of-range-compare warning.\n * DynamicCastToGenerated works for nullptr input for even if RTTI is disabled\n * Arena is refactored and optimized.\n * Clarified/specified that the exact value of Arena::SpaceAllocated() is an\n implementation detail users must not rely on. It should not be used in\n unit tests.\n * Change the signature of Any::PackFrom() to return false on error.\n * Add fast reflection getter API for strings.\n * Constant initialize the global message instances\n * Avoid potential for missed wakeup in UnknownFieldSet\n * Now Proto3 Oneof fields have \u0027has\u0027 methods for checking their presence in\n C++.\n * Bugfix for NVCC\n * Return early in _InternalSerialize for empty maps.\n * Adding functionality for outputting map key values in proto path logging\n output (does not affect comparison logic) and stop printing \u0027value\u0027 in the\n path. The modified print functionality is in the\n MessageDifferencer::StreamReporter.\n * Fixed https://github.com/protocolbuffers/protobuf/issues/8129\n * Ensure that null char symbol, package and file names do not result in a\n crash.\n * Constant initialize the global message instances\n * Pretty print \u0027max\u0027 instead of numeric values in reserved ranges.\n * Removed remaining instances of std::is_pod, which is deprecated in C++20.\n * Changes to reduce code size for unknown field handling by making uncommon\n cases out of line.\n * Fix std::is_pod deprecated in C++20 (#7180)\n * Fix some -Wunused-parameter warnings (#8053)\n * Fix detecting file as directory on zOS issue #8051 (#8052)\n * Don\u0027t include sys/param.h for _BYTE_ORDER (#8106)\n * remove CMAKE_THREAD_LIBS_INIT from pkgconfig CFLAGS (#8154)\n * Fix TextFormatMapTest.DynamicMessage issue#5136 (#8159)\n * Fix for compiler warning issue#8145 (#8160)\n * fix: support deprecated enums for GCC \u003c 6 (#8164)\n * Fix some warning when compiling with Visual Studio 2019 on x64 target (#8125)\n Python:\n * Provided an override for the reverse() method that will reverse the internal\n collection directly instead of using the other methods of the BaseContainer.\n * MessageFactory.CreateProtoype can be overridden to customize class creation.\n * Fix PyUnknownFields memory leak (#7928)\n * Add macOS big sur compatibility (#8126)\n JavaScript\n * Generate `getDescriptor` methods with `*` as their `this` type.\n * Enforce `let/const` for generated messages.\n * js/binary/utils.js: Fix jspb.utils.joinUnsignedDecimalString to work with\n negative bitsLow and low but non-zero bitsHigh parameter. (#8170)\n PHP:\n * Added support for PHP 8. (#8105)\n * unregister INI entries and fix invalid read on shutdown (#8042)\n * Fix PhpDoc comments for message accessors to include \u0027|null\u0027. (#8136)\n * fix: convert native PHP floats to single precision (#8187)\n * Fixed PHP to support field numbers \u003e=2**28. (#8235)\n * feat: add support for deprecated fields to PHP compiler (#8223)\n * Protect against stack overflow if the user derives from Message. (#8248)\n * Fixed clone for Message, RepeatedField, and MapField. (#8245)\n * Updated upb to allow nonzero offset minutes in JSON timestamps. (#8258)\n Ruby:\n * Added support for Ruby 3. (#8184)\n * Rewrote the data storage layer to be based on upb_msg objects from the\n upb library. This should lead to much better parsing performance,\n particularly for large messages. (#8184).\n * Fill out JRuby support (#7923)\n * [Ruby] Fix: (SIGSEGV) gRPC-Ruby issue on Windows. memory alloc infinite\n recursion/run out of memory (#8195)\n * Fix jruby support to handle messages nested more than 1 level deep (#8194)\n Java:\n * Avoid possible UnsupportedOperationException when using CodedInputSteam\n with a direct ByteBuffer.\n * Make Durations.comparator() and Timestamps.comparator() Serializable.\n * Add more detailed error information for dynamic message field type\n validation failure\n * Removed declarations of functions declared in java_names.h from\n java_helpers.h.\n * Now Proto3 Oneof fields have \u0027has\u0027 methods for checking their presence in\n Java.\n * Annotates Java proto generated *_FIELD_NUMBER constants.\n * Add -assumevalues to remove JvmMemoryAccessor on Android.\n C#:\n * Fix parsing negative Int32Value that crosses segment boundary (#8035)\n * Change ByteString to use memory and support unsafe create without copy (#7645)\n * Optimize MapField serialization by removing MessageAdapter (#8143)\n * Allow FileDescriptors to be parsed with extension registries (#8220)\n * Optimize writing small strings (#8149)\n\n- Updated URL to https://github.com/protocolbuffers/protobuf\n\nUpdate to v3.14.0\n\n Protocol Compiler:\n * The proto compiler no longer requires a .proto filename when it is not\n generating code.\n * Added flag `--deterministic_output` to `protoc --encode=...`.\n * Fixed deadlock when using google.protobuf.Any embedded in aggregate options.\n C++:\n * Arenas are now unconditionally enabled. cc_enable_arenas no longer has\n any effect.\n * Removed inlined string support, which is incompatible with arenas.\n * Fix a memory corruption bug in reflection when mixing optional and\n non-optional fields.\n * Make SpaceUsed() calculation more thorough for map fields.\n * Add stack overflow protection for text format with unknown field values.\n * FieldPath::FollowAll() now returns a bool to signal if an out-of-bounds\n error was encountered.\n * Performance improvements for Map.\n * Minor formatting fix when dumping a descriptor to .proto format with\n DebugString.\n * UBSAN fix in RepeatedField\n * When running under ASAN, skip a test that makes huge allocations.\n * Fixed a crash that could happen when creating more than 256 extensions in\n a single message.\n * Fix a crash in BuildFile when passing in invalid descriptor proto.\n * Parser security fix when operating with CodedInputStream.\n * Warn against the use of AllowUnknownExtension.\n * Migrated to C++11 for-range loops instead of index-based loops where\n possible. This fixes a lot of warnings when compiling with -Wsign-compare.\n * Fix segment fault for proto3 optional\n * Adds a CMake option to build `libprotoc` separately\n Java\n * Bugfix in mergeFrom() when a oneof has multiple message fields.\n * Fix RopeByteString.RopeInputStream.read() returning -1 when told to read\n 0 bytes when not at EOF.\n * Redefine remove(Object) on primitive repeated field Lists to avoid\n autoboxing.\n * Support \u0027\\u\u0027 escapes in textformat string literals.\n * Trailing empty spaces are no longer ignored for FieldMask.\n * Fix FieldMaskUtil.subtract to recursively remove mask.\n * Mark enums with `@java.lang.Deprecated` if the proto enum has option\n `deprecated = true;`.\n * Adding forgotten duration.proto to the lite library\n Python:\n * Print google.protobuf.NullValue as null instead of \u0027NULL_VALUE\u0027 when it is\n used outside WKT Value/Struct.\n * Fix bug occurring when attempting to deep copy an enum type in python 3.\n * Add a setuptools extension for generating Python protobufs\n * Remove uses of pkg_resources in non-namespace packages\n * [bazel/py] Omit google/__init__.py from the Protobuf runtime\n * Removed the unnecessary setuptools package dependency for Python package\n * Fix PyUnknownFields memory leak\n PHP:\n * Added support for \u0027==\u0027 to the PHP C extension\n * Added `==` operators for Map and Array\n * Native C well-known types\n * Optimized away hex2bin() call in generated code\n * New version of upb, and a new hash function wyhash in third_party\n * add missing hasOneof method to check presence of oneof fields\n Go:\n * Update go_package options to reference google.golang.org/protobuf module.\n C#:\n * annotate ByteString.CopyFrom(ReadOnlySpan\u003cbyte\u003e) as SecuritySafeCritical\n * Fix C# optional field reflection when there are regular fields too\n * Fix parsing negative Int32Value that crosses segment boundary\n Javascript:\n * JS: parse (un)packed fields conditionally\n\nUpdate to version 3.13.0\n PHP:\n * The C extension is completely rewritten. The new C extension has significantly\n better parsing performance and fixes a handful of conformance issues. It will\n also make it easier to add support for more features like proto2 and proto3 presence.\n * The new C extension does not support PHP 5.x. PHP 5.x users can still use pure-PHP.\n C++:\n * Removed deprecated unsafe arena string accessors\n * Enabled heterogeneous lookup for std::string keys in maps.\n * Removed implicit conversion from StringPiece to std::string\n * Fix use-after-destroy bug when the Map is allocated in the arena.\n * Improved the randomness of map ordering\n * Added stack overflow protection for text format with unknown fields\n * Use std::hash for proto maps to help with portability.\n * Added more Windows macros to proto whitelist.\n * Arena constructors for map entry messages are now marked \u0027explicit\u0027\n (for regular messages they were already explicit).\n * Fix subtle aliasing bug in RepeatedField::Add\n * Fix mismatch between MapEntry ByteSize and Serialize with respect to unset\n fields.\n Python:\n * JSON format conformance fixes:\n * Reject lowercase t for Timestamp json format.\n * Print full_name directly for extensions (no camelCase).\n * Reject boolean values for integer fields.\n * Reject NaN, Infinity, -Infinity that is not quoted.\n * Base64 fixes for bytes fields: accept URL-safe base64 and missing padding.\n * Bugfix for fields/files named \u0027async\u0027 or \u0027await\u0027.\n * Improved the error message when AttributeError is returned from __getattr__\n in EnumTypeWrapper.\n Java:\n * Fixed a bug where setting optional proto3 enums with setFooValue() would\n not mark the value as present.\n * Add Subtract function to FieldMaskUtil.\n C#:\n * Dropped support for netstandard1.0 (replaced by support for netstandard1.1).\n This was required to modernize the parsing stack to use the `Span\u003cbyte\u003e`\n type internally\n * Add `ParseFrom(ReadOnlySequence\u003cbyte\u003e)` method to enable GC friendly\n parsing with reduced allocations and buffer copies\n * Add support for serialization directly to a `IBufferWriter\u003cbyte\u003e` or\n to a `Span\u003cbyte\u003e` to enable GC friendly serialization.\n The new API is available as extension methods on the `IMessage` type\n * Add `GOOGLE_PROTOBUF_REFSTRUCT_COMPATIBILITY_MODE` define to make\n generated code compatible with old C# compilers (pre-roslyn compilers\n from .NET framework and old versions of mono) that do not support\n ref structs. Users that are still on a legacy stack that does\n not support C# 7.2 compiler might need to use the new define\n in their projects to be able to build the newly generated code\n * Due to the major overhaul of parsing and serialization internals,\n it is recommended to regenerate your generated code to achieve the best\n performance (the legacy generated code will still work, but might incur\n a slight performance penalty).\n\nUpdate to version 3.12.3; notable changes since 3.11.4:\n\n Protocol Compiler:\n * [experimental] Singular, non-message typed fields in proto3 now support\n presence tracking. This is enabled by adding the \u0027optional\u0027 field label and\n passing the --experimental_allow_proto3_optional flag to protoc.\n * For usage info, see docs/field_presence.md.\n * During this experimental phase, code generators should update to support\n proto3 presence, see docs/implementing_proto3_presence.md for instructions.\n * Allow duplicate symbol names when multiple descriptor sets are passed on\n the command-line, to match the behavior when multiple .proto files are passed.\n * Deterministic `protoc --descriptor_set_out` (#7175)\n Objective-C:\n * Tweak the union used for Extensions to support old generated code. #7573\n * Fix for the :protobuf_objc target in the Bazel BUILD file. (#7538)\n * [experimental] ObjC Proto3 optional support (#7421)\n * Block subclassing of generated classes (#7124)\n * Use references to Obj C classes instead of names in descriptors. (#7026)\n * Revisit how the WKTs are bundled with ObjC. (#7173)\n C++:\n * Simplified the template export macros to fix the build for mingw32. (#7539)\n * [experimental] Added proto3 presence support.\n * New descriptor APIs to support proto3 presence.\n * Enable Arenas by default on all .proto files.\n * Documented that users are not allowed to subclass Message or MessageLite.\n * Mark generated classes as final; inheriting from protos is strongly discouraged.\n * Add stack overflow protection for text format with unknown fields.\n * Add accessors for map key and value FieldDescriptors.\n * Add FieldMaskUtil::FromFieldNumbers().\n * MessageDifferencer: use ParsePartial() on Any fields so the diff does not\n fail when there are missing required fields.\n * ReflectionOps::Merge(): lookup messages in the right factory, if it can.\n * Added Descriptor::WellKnownTypes enum and Descriptor::well_known_type()\n accessor as an easier way of determining if a message is a Well-Known Type.\n * Optimized RepeatedField::Add() when it is used in a loop.\n * Made proto move/swap more efficient.\n * De-virtualize the GetArena() method in MessageLite.\n * Improves performance of json_stream_parser.cc by factor 1000 (#7230)\n * bug: #7076 undefine Windows OUT and OPTIONAL macros (#7087)\n * Fixed a bug in FieldDescriptor::DebugString() that would erroneously print\n an \u0027optional\u0027 label for a field in a oneof.\n * Fix bug in parsing bool extensions that assumed they are always 1 byte.\n * Fix off-by-one error in FieldOptions::ByteSize() when extensions are present.\n * Clarified the comments to show an example of the difference between\n Descriptor::extension and DescriptorPool::FindAllExtensions.\n * Add a compiler option \u0027code_size\u0027 to force optimize_for=code_size on all\n protos where this is possible.\n Ruby:\n * Re-add binary gems for Ruby 2.3 and 2.4. These are EOL upstream, however\n many people still use them and dropping support will require more\n coordination.\n * [experimental] Implemented proto3 presence for Ruby. (#7406)\n * Stop building binary gems for ruby \u003c2.5 (#7453)\n * Fix for wrappers with a zero value (#7195)\n * Fix for JSON serialization of 0/empty-valued wrapper types (#7198)\n * Call \u0027Class#new\u0027 over rb_class_new_instance in decoding (#7352)\n * Build extensions for Ruby 2.7 (#7027)\n * assigning \u0027nil\u0027 to submessage should clear the field. (#7397)\n Java:\n * [experimental] Added proto3 presence support.\n * Mark java enum _VALUE constants as @Deprecated if the enum field is deprecated\n * reduce \u003cclinit\u003e size for enums with allow_alias set to true.\n * Sort map fields alphabetically by the field\u0027s key when printing textproto.\n * Fixed a bug in map sorting that appeared in -rc1 and -rc2 (#7508).\n * TextFormat.merge() handles Any as top level type.\n * Throw a descriptive IllegalArgumentException when calling\n getValueDescriptor() on enum special value UNRECOGNIZED instead of\n ArrayIndexOutOfBoundsException.\n * Fixed an issue with JsonFormat.printer() where setting printingEnumsAsInts()\n would override the configuration passed into includingDefaultValueFields().\n * Implement overrides of indexOf() and contains() on primitive lists returned\n for repeated fields to avoid autoboxing the list contents.\n * Add overload to FieldMaskUtil.fromStringList that accepts a descriptor.\n * [bazel] Move Java runtime/toolchains into //java (#7190)\n Python:\n * [experimental] Added proto3 presence support.\n * [experimental] fast import protobuf module, only works with cpp generated code linked in.\n * Truncate \u0027float\u0027 fields to 4 bytes of precision in setters for pure-Python\n implementation (C++ extension was already doing this).\n * Fixed a memory leak in C++ bindings.\n * Added a deprecation warning when code tries to create Descriptor objects\n directly.\n * Fix unintended comparison between bytes and string in descriptor.py.\n * Avoid printing excess digits for float fields in TextFormat.\n * Remove Python 2.5 syntax compatibility from the proto compiler generated _pb2.py module code.\n * Drop 3.3, 3.4 and use single version docker images for all python tests (#7396)\n JavaScript:\n * Fix js message pivot selection (#6813)\n PHP:\n * Persistent Descriptor Pool (#6899)\n * Implement lazy loading of php class for proto messages (#6911)\n * Correct @return in Any.unpack docblock (#7089)\n * Ignore unknown enum value when ignore_unknown specified (#7455)\n C#:\n * [experimental] Add support for proto3 presence fields in C# (#7382)\n * Mark GetOption API as obsolete and expose the \u0027GetOptions()\u0027 method on descriptors instead (#7491)\n * Remove Has/Clear members for C# message fields in proto2 (#7429)\n * Enforce recursion depth checking for unknown fields (#7132)\n * Fix conformance test failures for Google.Protobuf (#6910)\n * Cleanup various bits of Google.Protobuf (#6674)\n * Fix latest ArgumentException for C# extensions (#6938)\n * Remove unnecessary branch from ReadTag (#7289)\n Other:\n * Add a proto_lang_toolchain for javalite (#6882)\n * [bazel] Update gtest and deprecate //external:{gtest,gtest_main} (#7237)\n * Add application note for explicit presence tracking. (#7390)\n * Howto doc for implementing proto3 presence in a code generator. (#7407)\n\nUpdate to version 3.11.4; notable changes since 3.9.2:\n\n * C++: Make serialization method naming consistent\n * C++: Moved ShutdownProtobufLibrary() to message_lite.h. For\n backward compatibility a declaration is still available\n in stubs/common.h, but users should prefer message_lite.h\n * C++: Removed non-namespace macro EXPECT_OK()\n * C++: Removed mathlimits.h from stubs in favor of using\n std::numeric_limits from C++11\n * C++: Support direct pickling of nested messages\n * C++: Disable extension code gen for C#\n * C++: Switch the proto parser to the faster MOMI parser\n * C++: Unused imports of files defining descriptor extensions\n will now be reported\n * C++: Add proto2::util::RemoveSubranges to remove multiple\n subranges in linear time\n * C++: Support 32 bit values for ProtoStreamObjectWriter to Struct\n * C++: Removed the internal-only header coded_stream_inl.h and\n the internal-only methods defined there\n * C++: Enforced no SWIG wrapping of descriptor_database.h\n (other headers already had this restriction)\n * C++: Implementation of the equivalent of the MOMI parser for\n serialization. This removes one of the two serialization\n routines, by making the fast array serialization routine\n completely general. SerializeToCodedStream can now be\n implemented in terms of the much much faster array\n serialization. The array serialization regresses slightly,\n but when array serialization is not possible this wins big\n * C++: Add move constructor for Reflection\u0027s SetString\n * Java: Remove the usage of MethodHandle, so that Android users\n prior to API version 26 can use protobuf-java\n * Java: Publish ProGuard config for javalite\n * Java: Include unknown fields when merging proto3 messages in\n Java lite builders\n * Java: Have oneof enums implement a separate interface (other\n than EnumLite) for clarity\n * Java: Opensource Android Memory Accessors\n * Java: Change ProtobufArrayList to use Object[] instead of\n ArrayList for 5-10% faster parsing\n * Java: Make a copy of JsonFormat.TypeRegistry at the protobuf\n top level package. This will eventually replace\n JsonFormat.TypeRegistry\n * Java: Add Automatic-Module-Name entries to the Manifest\n * Python: Add float_precision option in json format printer\n * Python: Optionally print bytes fields as messages in unknown\n fields, if possible\n * Python: Experimental code gen (fast import protobuf module)\n which only work with cpp generated code linked in\n * Python: Add descriptor methods in descriptor_pool are deprecated\n * Python: Added delitem for Python extension dict\n * JavaScript: Remove guard for Symbol iterator for jspb.Map\n * JavaScript: Remove deprecated boolean option to getResultBase64String()\n * JavaScript: Change the parameter types of binaryReaderFn in\n ExtensionFieldBinaryInfo to (number, ?, ?)\n * JavaScript: Create dates.ts and time_of_days.ts to mirror Java\n versions. This is a near-identical conversion of\n c.g.type.util.{Dates,TimeOfDays} respectively\n * JavaScript: Migrate moneys to TypeScript\n * PHP: Increase php7.4 compatibility\n * PHP: Implement lazy loading of php class for proto messages\n * Ruby: Support hashes for struct initializers\n * C#: Experimental proto2 support is now officially available\n * C#: Change _Extensions property to normal body rather than expression\n * Objective C: Remove OSReadLittle* due to alignment requirements\n * Other: Override CocoaPods module to lowercase\n * further bugfixes and optimisations\n- Install LICENSE\n- Drop protobuf-libs as it is just workaround for rpmlint issue\n * python bindings now require recent python-google-apputils\n * Released memory allocated by InitializeDefaultRepeatedFields()\n and GetEmptyString(). Some memory sanitizers reported them\n * Updated DynamicMessage.setField() to handle repeated enum\n * Fixed a bug that caused NullPointerException to be thrown when\n converting manually constructed FileDescriptorProto to\n * Added oneofs(unions) feature. Fields in the same oneof will\n * Files, services, enums, messages, methods and enum values\n * Added Support for list values, including lists of mesaages,\n * Added SwapFields() in reflection API to swap a subset of\n * Repeated primitive extensions are now packable. The\n it is possible to switch a repeated extension field to\n * writeTo() method in ByteString can now write a substring to\n * java_generate_equals_and_hash can now be used with the\n * A new C++-backed extension module (aka \u0027cpp api v2\u0027) that\n replaces the old (\u0027cpp api v1\u0027) one. Much faster than the\n pure Python code. This one resolves many bugs and is\n mosh reqires it\n\npython-abseil was udpated:\n\nversion update to 1.4.0\n New:\n (testing) Added @flagsaver.as_parsed: this allows saving/restoring flags\n using string values as if parsed from the command line and will also reflect\n other flag states after command line parsing, e.g. .present is set.\n Changed:\n (logging) If no log dir is specified logging.find_log_dir() now falls back\n to tempfile.gettempdir() instead of /tmp/.\n Fixed:\n (flags) Additional kwargs (e.g. short_name=) to DEFINE_multi_enum_class\n are now correctly passed to the underlying Flag object.\n\nversion update to 1.2.0\n * Fixed a crash in Python 3.11 when `TempFileCleanup.SUCCESS` is used.\n * `Flag` instances now raise an error if used in a bool context. This prevents\n the occasional mistake of testing an instance for truthiness rather than\n testing `flag.value`.\n * `absl-py` no longer depends on `six`.\n\nUpdate to version 1.0.0 \n * absl-py no longer supports Python 2.7, 3.4, 3.5. All versions\n have reached end-of-life for more than a year now.\n * New releases will be tagged as vX.Y.Z instead of pypi-vX.Y.Z in\n the git repo going forward.\n\n- Release notes for 0.15.0\n\n * (testing) #128: When running bazel with its --test_filter=\n flag, it now treats the filters as unittest\u0027s -k flag in Python\n 3.7+.\n\n- Release notes for 0.14.1\n\n * Top-level LICENSE file is now exported in bazel.\n\n- Release notes for 0.14.0\n\n * #171: Creating argparse_flags.ArgumentParser with\n argument_default= no longer raises an exception when other\n absl.flags flags are defined.\n * #173: absltest now correctly sets up test filtering and fail\n fast flags when an explicit argv= parameter is passed to\n absltest.main.\n\n- Release notes for 0.13.0\n * (app) Type annotations for public app interfaces.\n * (testing) Added new decorator @absltest.skipThisClass to\n indicate a class contains shared functionality to be used as a\n base class for other TestCases, and therefore should be\n skipped.\n * (app) Annotated the flag_parser paramteter of run as\n keyword-only. This keyword-only constraint will be enforced at\n runtime in a future release.\n * (app, flags) Flag validations now include all errors from\n disjoint flag sets, instead of fail fast upon first error from\n all validators. Multiple validators on the same flag still\n fails fast.\n- Release notes for 0.12.0\n * (flags) Made EnumClassSerializer and EnumClassListSerializer\n public.\n * (flags) Added a required: Optional[bool] = False parameter to\n DEFINE_* functions.\n * (testing) flagsaver overrides can now be specified in terms of\n FlagHolder.\n * (testing) parameterized.product: Allows testing a method over\n cartesian product of parameters values, specified as a\n sequences of values for each parameter or as kwargs-like dicts\n of parameter values.\n * (testing) Added public flag holders for --test_srcdir and\n --test_tmpdir. Users should use absltest.TEST_SRCDIR.value and\n absltest.TEST_TMPDIR.value instead of FLAGS.test_srcdir and\n FLAGS.test_tmpdir.\n * (flags) Made CsvListSerializer respect its delimiter argument.\n\n- Add Provides python-absl-py\n\npython-grpcuio was updated:\n\n- Update to version 1.60.0:\n * No python specfic changes.\n\n- Update to version 1.59.2:\n * No python specific changes.\n\n- Update to version 1.59.0:\n * [Python 3.12] Support Python 3.12 (gh#grpc/grpc#34398).\n * [Python 3.12] Deprecate distutil (gh#grpc/grpc#34186).\n\n- Update to version 1.58.0:\n * [Bazel] Enable grpcio-reflection to be used via Bazel\n (gh#grpc/grpc#31013).\n * [packaging] Publish xds-protos as part of the standard package\n pipeline (gh#grpc/grpc#33797).\n\n- Update to version 1.57.0: (CVE-2023-4785, bsc#1215334, CVE-2023-33953, bsc#1214148)\n * [posix] Enable systemd sockets for libsystemd\u003e=233\n (gh#grpc/grpc#32671).\n * [python O11Y] Initial Implementation (gh#grpc/grpc#32974).\n- Build with LTO (don\u0027t set _lto_cflags to %nil).\n- No need to pass \u0027-std=c++17\u0027 to build CFLAGS.\n\n- Update to version 1.56.2:\n\n * [WRR] backport (gh#grpc/grpc#33694) to 1.56\n (gh#grpc/grpc#33698)\n * [backport][iomgr][EventEngine] Improve server handling of\n file descriptor exhaustion (gh#grpc/grpc#33667)\n- Switch build to pip/wheel.\n- Use system abseil with \u0027-std=c++17\u0027 to prevent undefined symbol\n eg. with python-grpcio-tools (_ZN3re23RE213GlobalReplaceEPNSt7__\n cxx1112basic_stringIcSt11char_traitsIcESaIcEEERKS0_N4absl12lts_\n 2023012511string_viewE)\n\n- Upstream only supports python \u003e= 3.7, so adjust BuildRequires\n accordingly.\n\n- Add %{?sle15_python_module_pythons}\n\n- Update to version 1.56.0: (CVE-2023-32731, bsc#1212180)\n * [aio types] Fix some grpc.aio python types\n (gh#grpc/grpc#32475).\n\n- Update to version 1.55.0:\n * [EventEngine] Disable EventEngine polling in gRPC Python\n (gh#grpc/grpc#33279) (gh#grpc/grpc#33320).\n * [Bazel Python3.11] Update Bazel dependencies for Python 3.11\n (gh#grpc/grpc#33318) (gh#grpc/grpc#33319).\n- Drop Requires: python-six; not required any more.\n- Switch Suggests to Recommends.\n\n- Update to version 1.54.0: (CVE-2023-32732, bsc#1212182)\n * Fix DeprecationWarning when calling asyncio.get_event_loop()\n (gh#grpc/grpc#32533).\n * Remove references to deprecated syntax field\n (gh#grpc/grpc#32497).\n\n- Update to version 1.51.1:\n * No Linux specific changes.\n- Changes from version 1.51.0:\n * Fix lack of cooldown between poll attempts\n (gh#grpc/grpc#31550).\n * Remove enum and future (gh#grpc/grpc#31381).\n * [Remove Six] Remove dependency on six (gh#grpc/grpc#31340).\n * Update xds-protos package to pull in protobuf 4.X\n (gh#grpc/grpc#31113).\n\n- Update to version 1.50.0:\n * Support Python 3.11. [gh#grpc/grpc#30818].\n\n- Update to version 1.49.1\n * Support Python 3.11. (#30818)\n * Add type stub generation support to grpcio-tools. (#30498)\n\n- Update to version 1.48.0:\n * [Aio] Ensure Core channel closes when deallocated\n [gh#grpc/grpc#29797].\n * [Aio] Fix the wait_for_termination return value\n [gh#grpc/grpc#29795].\n\n- update to 1.46.3:\n * backport: xds: use federation env var to guard new-style resource name parsing\n * This release contains refinements, improvements, and bug fixes. \n\n- Update to version 1.46.0:\n * Add Python GCF Distribtest [gh#grpc/grpc#29303].\n * Add Python Reflection Client [gh#grpc/grpc#29085].\n * Revert \u0027Fix prefork handler register\u0027s default behavior\u0027\n [gh#grpc/grpc#29229].\n * Fix prefork handler register\u0027s default behavior\n [gh#grpc/grpc#29103].\n * Fix fetching CXX variable in setup.py [gh#grpc/grpc#28873].\n\n- Update to version 1.45.0:\n * Reimplement Gevent Integration [gh#grpc/grpc#28276].\n * Support musllinux binary wheels on x64 and x86\n [gh#grpc/grpc#28092].\n * Increase the Python protobuf requirement to \u003e=3.12.0\n [gh#grpc/grpc#28604].\n- Build with system re2; add BuildRequires: pkgconfig(re2).\n\n- Update to version 1.44.0:\n\n * Add python async example for hellostreamingworld using\n generator (gh#grpc/grpc#27343).\n * Disable __wrap_memcpy hack for Python builds\n (gh#grpc/grpc#28410).\n * Bump Bazel Python Cython dependency to 0.29.26\n (gh#grpc/grpc#28398).\n * Fix libatomic linking on Raspberry Pi OS Bullseye\n (gh#grpc/grpc#28041).\n * Allow generated proto sources in remote repositories for\n py_proto_library (gh#grpc/grpc#28103).\n\n- Update to version 1.43.0:\n * [Aio] Validate the input type for set_trailing_metadata and\n abort (gh#grpc/grpc#27958).\n\n- update to 1.41.1:\n * This is release 1.41.0 (goat) of gRPC Core. \n\n- Update to version 1.41.0:\n * Add Python 3.10 support and drop 3.5 (gh#grpc/grpc#26074).\n * [Aio] Remove custom IO manager support (gh#grpc/grpc#27090).\n\n- Update to version 1.39.0:\n * Python AIO: Match continuation typing on Interceptors\n (gh#grpc/grpc#26500).\n * Workaround #26279 by publishing manylinux_2_24 wheels instead\n of manylinux2014 on aarch64 (gh#grpc/grpc#26430).\n * Fix zlib unistd.h import problem (gh#grpc/grpc#26374).\n * Handle gevent exception in gevent poller (gh#grpc/grpc#26058).\n\n- Update to version 1.38.1:\n * Backport gh#grpc/grpc#26430 and gh#grpc/grpc#26435 to v1.38.x\n (gh#grpc/grpc#26436).\n\n- Update to version 1.38.0:\n * Add grpcio-admin Python package (gh#grpc/grpc#26166).\n * Add CSDS API to Python (gh#grpc/grpc#26114).\n * Expose code and details from context on the server side\n (gh#grpc/grpc#25457).\n * Explicitly import importlib.abc; required on Python 3.10.\n Fixes #26062 (gh#grpc/grpc#26083).\n * Fix potential deadlock on the GIL in AuthMetdataPlugin\n (gh#grpc/grpc#26009).\n * Introduce new Python package \u0027xds_protos\u0027\n (gh#grpc/grpc#25975).\n * Remove async mark for set_trailing_metadata interface\n (gh#grpc/grpc#25814).\n\n- Update to version 1.37.1:\n * No user visible changes.\n- Changes from version 1.37.0:\n * Clarify Guarantees about grpc.Future Interface\n (gh#grpc/grpc#25383).\n * [Aio] Add time_remaining method to ServicerContext\n (gh#grpc/grpc#25719).\n * Standardize all environment variable boolean configuration in\n python\u0027s setup.py (gh#grpc/grpc#25444).\n * Fix Signal Safety Issue (gh#grpc/grpc#25394).\n\n- Update to version 1.36.1:\n * Core: back-port: add env var protection for google-c2p\n resolver (gh#grpc/grpc#25569).\n\n- Update to version 1.35.0:\n * Implement Python Client and Server xDS Creds.\n (gh#grpc/grpc#25365)\n * Add %define _lto_cflags %{nil} (bsc#1182659) (rh#1893533)\n * Link roots.pem to ca-bundle.pem from ca-certificates package\n\n- Update to version 1.34.1:\n * Backport \u0027Lazily import grpc_tools when using runtime\n stub/message generation\u0027 to 1.34.x (gh#grpc/grpc#25011).\n\n- Update to version 1.34.0:\n * Incur setuptools as an dependency for grpcio_tools\n (gh#grpc/grpc#24752).\n * Stop the spamming log generated by ctrl-c for AsyncIO server\n (gh#grpc/grpc#24718).\n * [gRPC Easy] Make Well-Known Types Available to Runtime Protos\n (gh#grpc/grpc#24478).\n * Bump MACOSX_DEPLOYMENT_TARGET to 10.10 for Python\n (gh#grpc/grpc#24480).\n * Make Python 2 an optional dependency for Bazel build\n (gh#grpc/grpc#24407).\n * [Linux] [macOS] Support pre-compiled Python 3.9 wheels\n (gh#grpc/grpc#24356).\n\n- Update to version 1.33.2:\n\n * [Backport] Implement grpc.Future interface in\n SingleThreadedRendezvous (gh#grpc/grpc#24574).\n\n- Update to version 1.33.1:\n\n * [Backport] Make Python 2 an optional dependency for Bazel\n build (gh#grpc/grpc#24452).\n * Allow asyncio API to be imported as grpc.aio.\n (gh#grpc/grpc#24289).\n * [gRPC Easy] Fix import errors on Windows (gh#grpc/grpc#24124).\n * Make version check for importlib.abc in grpcio-tools more\n stringent (gh#grpc/grpc#24098).\n\nAdded re2 package in version 2024-02-01.\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2024-573,SUSE-SLE-INSTALLER-15-SP4-2024-573,SUSE-SLE-INSTALLER-15-SP5-2024-573,SUSE-SLE-Micro-5.3-2024-573,SUSE-SLE-Micro-5.4-2024-573,SUSE-SLE-Micro-5.5-2024-573,SUSE-SLE-Module-Basesystem-15-SP5-2024-573,SUSE-SLE-Module-Development-Tools-15-SP5-2024-573,SUSE-SLE-Module-Packagehub-Subpackages-15-SP5-2024-573,SUSE-SLE-Module-Public-Cloud-15-SP4-2024-573,SUSE-SLE-Module-Public-Cloud-15-SP5-2024-573,SUSE-SLE-Module-Python3-15-SP5-2024-573,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2024-573,SUSE-SLE-Product-HPC-15-SP4-LTSS-2024-573,SUSE-SLE-Product-SLED-15-SP4-LTSS-2024-573,SUSE-SLE-Product-SLES-15-SP4-LTSS-2024-573,SUSE-SLE-Product-SLES_SAP-15-SP4-2024-573,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-2024-573,SUSE-SLE-Product-WE-15-SP5-2024-573,openSUSE-Leap-Micro-5.3-2024-573,openSUSE-Leap-Micro-5.4-2024-573,openSUSE-SLE-15.5-2024-573",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2024_0573-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2024:0573-1",
"url": "https://www.suse.com/support/update/announcement/2024/suse-su-20240573-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2024:0573-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2024-February/017985.html"
},
{
"category": "self",
"summary": "SUSE Bug 1133277",
"url": "https://bugzilla.suse.com/1133277"
},
{
"category": "self",
"summary": "SUSE Bug 1182659",
"url": "https://bugzilla.suse.com/1182659"
},
{
"category": "self",
"summary": "SUSE Bug 1203378",
"url": "https://bugzilla.suse.com/1203378"
},
{
"category": "self",
"summary": "SUSE Bug 1208794",
"url": "https://bugzilla.suse.com/1208794"
},
{
"category": "self",
"summary": "SUSE Bug 1212180",
"url": "https://bugzilla.suse.com/1212180"
},
{
"category": "self",
"summary": "SUSE Bug 1212182",
"url": "https://bugzilla.suse.com/1212182"
},
{
"category": "self",
"summary": "SUSE Bug 1214148",
"url": "https://bugzilla.suse.com/1214148"
},
{
"category": "self",
"summary": "SUSE Bug 1215334",
"url": "https://bugzilla.suse.com/1215334"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32731 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32731/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-32732 page",
"url": "https://www.suse.com/security/cve/CVE-2023-32732/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-33953 page",
"url": "https://www.suse.com/security/cve/CVE-2023-33953/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-44487 page",
"url": "https://www.suse.com/security/cve/CVE-2023-44487/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2023-4785 page",
"url": "https://www.suse.com/security/cve/CVE-2023-4785/"
}
],
"title": "Security update for abseil-cpp, grpc, opencensus-proto, protobuf, python-abseil, python-grpcio, re2",
"tracking": {
"current_release_date": "2024-02-21T08:37:00Z",
"generator": {
"date": "2024-02-21T08:37:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2024:0573-1",
"initial_release_date": "2024-02-21T08:37:00Z",
"revision_history": [
{
"date": "2024-02-21T08:37:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"product": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"product_id": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "grpc-devel-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "grpc-devel-1.60.0-150400.8.3.2.aarch64",
"product_id": "grpc-devel-1.60.0-150400.8.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"product": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"product_id": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"product_id": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"product_id": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"product_id": "libgrpc37-1.60.0-150400.8.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"product": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"product_id": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"product": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"product_id": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"product": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"product_id": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libre2-11-20240201-150400.9.3.1.aarch64",
"product": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64",
"product_id": "libre2-11-20240201-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64",
"product_id": "libupb37-1.60.0-150400.8.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"product": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"product_id": "protobuf-devel-25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "protobuf-java-25.1-150400.9.3.1.aarch64",
"product": {
"name": "protobuf-java-25.1-150400.9.3.1.aarch64",
"product_id": "protobuf-java-25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"product": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"product_id": "python311-grpcio-1.60.0-150400.9.3.2.aarch64"
}
},
{
"category": "product_version",
"name": "python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"product": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"product_id": "python311-protobuf-4.25.1-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "re2-devel-20240201-150400.9.3.1.aarch64",
"product": {
"name": "re2-devel-20240201-150400.9.3.1.aarch64",
"product_id": "re2-devel-20240201-150400.9.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-150400.8.3.2.aarch64",
"product": {
"name": "upb-devel-1.60.0-150400.8.3.2.aarch64",
"product_id": "upb-devel-1.60.0-150400.8.3.2.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libabsl2308_0_0-64bit-20230802.1-150400.10.4.1.aarch64_ilp32",
"product": {
"name": "libabsl2308_0_0-64bit-20230802.1-150400.10.4.1.aarch64_ilp32",
"product_id": "libabsl2308_0_0-64bit-20230802.1-150400.10.4.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product": {
"name": "libprotobuf-lite25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product_id": "libprotobuf-lite25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product": {
"name": "libprotobuf25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product_id": "libprotobuf25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product": {
"name": "libprotoc25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32",
"product_id": "libprotoc25_1_0-64bit-25.1-150400.9.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libre2-11-64bit-20240201-150400.9.3.1.aarch64_ilp32",
"product": {
"name": "libre2-11-64bit-20240201-150400.9.3.1.aarch64_ilp32",
"product_id": "libre2-11-64bit-20240201-150400.9.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.i586",
"product": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.i586",
"product_id": "abseil-cpp-devel-20230802.1-150400.10.4.1.i586"
}
},
{
"category": "product_version",
"name": "grpc-devel-1.60.0-150400.8.3.2.i586",
"product": {
"name": "grpc-devel-1.60.0-150400.8.3.2.i586",
"product_id": "grpc-devel-1.60.0-150400.8.3.2.i586"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.i586",
"product": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.i586",
"product_id": "libabsl2308_0_0-20230802.1-150400.10.4.1.i586"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.i586",
"product": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.i586",
"product_id": "libgrpc++1_60-1.60.0-150400.8.3.2.i586"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-150400.8.3.2.i586",
"product": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.i586",
"product_id": "libgrpc1_60-1.60.0-150400.8.3.2.i586"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-150400.8.3.2.i586",
"product": {
"name": "libgrpc37-1.60.0-150400.8.3.2.i586",
"product_id": "libgrpc37-1.60.0-150400.8.3.2.i586"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.i586",
"product": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.i586",
"product_id": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.i586",
"product": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.i586",
"product_id": "libprotobuf25_1_0-25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-25.1-150400.9.3.1.i586",
"product": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.i586",
"product_id": "libprotoc25_1_0-25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "libre2-11-20240201-150400.9.3.1.i586",
"product": {
"name": "libre2-11-20240201-150400.9.3.1.i586",
"product_id": "libre2-11-20240201-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-150400.8.3.2.i586",
"product": {
"name": "libupb37-1.60.0-150400.8.3.2.i586",
"product_id": "libupb37-1.60.0-150400.8.3.2.i586"
}
},
{
"category": "product_version",
"name": "protobuf-devel-25.1-150400.9.3.1.i586",
"product": {
"name": "protobuf-devel-25.1-150400.9.3.1.i586",
"product_id": "protobuf-devel-25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "protobuf-java-25.1-150400.9.3.1.i586",
"product": {
"name": "protobuf-java-25.1-150400.9.3.1.i586",
"product_id": "protobuf-java-25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-150400.9.3.2.i586",
"product": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.i586",
"product_id": "python311-grpcio-1.60.0-150400.9.3.2.i586"
}
},
{
"category": "product_version",
"name": "python311-protobuf-4.25.1-150400.9.3.1.i586",
"product": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.i586",
"product_id": "python311-protobuf-4.25.1-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "re2-devel-20240201-150400.9.3.1.i586",
"product": {
"name": "re2-devel-20240201-150400.9.3.1.i586",
"product_id": "re2-devel-20240201-150400.9.3.1.i586"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-150400.8.3.2.i586",
"product": {
"name": "upb-devel-1.60.0-150400.8.3.2.i586",
"product_id": "upb-devel-1.60.0-150400.8.3.2.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "grpc-source-1.60.0-150400.8.3.2.noarch",
"product": {
"name": "grpc-source-1.60.0-150400.8.3.2.noarch",
"product_id": "grpc-source-1.60.0-150400.8.3.2.noarch"
}
},
{
"category": "product_version",
"name": "opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"product": {
"name": "opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"product_id": "opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch"
}
},
{
"category": "product_version",
"name": "python311-abseil-1.4.0-150400.9.3.1.noarch",
"product": {
"name": "python311-abseil-1.4.0-150400.9.3.1.noarch",
"product_id": "python311-abseil-1.4.0-150400.9.3.1.noarch"
}
}
],
"category": "architecture",
"name": "noarch"
},
{
"branches": [
{
"category": "product_version",
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"product": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"product_id": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"product_id": "grpc-devel-1.60.0-150400.8.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"product": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"product_id": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"product_id": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"product_id": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"product_id": "libgrpc37-1.60.0-150400.8.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"product": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"product_id": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"product": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"product_id": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"product": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"product_id": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libre2-11-20240201-150400.9.3.1.ppc64le",
"product": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le",
"product_id": "libre2-11-20240201-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"product_id": "libupb37-1.60.0-150400.8.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"product": {
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"product_id": "protobuf-devel-25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "protobuf-java-25.1-150400.9.3.1.ppc64le",
"product": {
"name": "protobuf-java-25.1-150400.9.3.1.ppc64le",
"product_id": "protobuf-java-25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"product": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"product_id": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le"
}
},
{
"category": "product_version",
"name": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"product": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"product_id": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "re2-devel-20240201-150400.9.3.1.ppc64le",
"product": {
"name": "re2-devel-20240201-150400.9.3.1.ppc64le",
"product_id": "re2-devel-20240201-150400.9.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-150400.8.3.2.ppc64le",
"product": {
"name": "upb-devel-1.60.0-150400.8.3.2.ppc64le",
"product_id": "upb-devel-1.60.0-150400.8.3.2.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"product": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"product_id": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x"
}
},
{
"category": "product_version",
"name": "grpc-devel-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "grpc-devel-1.60.0-150400.8.3.2.s390x",
"product_id": "grpc-devel-1.60.0-150400.8.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"product": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"product_id": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"product_id": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"product_id": "libgrpc1_60-1.60.0-150400.8.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"product_id": "libgrpc37-1.60.0-150400.8.3.2.s390x"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"product": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"product_id": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"product": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"product_id": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"product": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"product_id": "libprotoc25_1_0-25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libre2-11-20240201-150400.9.3.1.s390x",
"product": {
"name": "libre2-11-20240201-150400.9.3.1.s390x",
"product_id": "libre2-11-20240201-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "libupb37-1.60.0-150400.8.3.2.s390x",
"product_id": "libupb37-1.60.0-150400.8.3.2.s390x"
}
},
{
"category": "product_version",
"name": "protobuf-devel-25.1-150400.9.3.1.s390x",
"product": {
"name": "protobuf-devel-25.1-150400.9.3.1.s390x",
"product_id": "protobuf-devel-25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "protobuf-java-25.1-150400.9.3.1.s390x",
"product": {
"name": "protobuf-java-25.1-150400.9.3.1.s390x",
"product_id": "protobuf-java-25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-150400.9.3.2.s390x",
"product": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.s390x",
"product_id": "python311-grpcio-1.60.0-150400.9.3.2.s390x"
}
},
{
"category": "product_version",
"name": "python311-protobuf-4.25.1-150400.9.3.1.s390x",
"product": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.s390x",
"product_id": "python311-protobuf-4.25.1-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "re2-devel-20240201-150400.9.3.1.s390x",
"product": {
"name": "re2-devel-20240201-150400.9.3.1.s390x",
"product_id": "re2-devel-20240201-150400.9.3.1.s390x"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-150400.8.3.2.s390x",
"product": {
"name": "upb-devel-1.60.0-150400.8.3.2.s390x",
"product_id": "upb-devel-1.60.0-150400.8.3.2.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"product": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"product_id": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "grpc-devel-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "grpc-devel-1.60.0-150400.8.3.2.x86_64",
"product_id": "grpc-devel-1.60.0-150400.8.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"product": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"product_id": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"product": {
"name": "libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"product_id": "libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"product_id": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"product_id": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"product_id": "libgrpc37-1.60.0-150400.8.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"product_id": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product_id": "libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"product_id": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product_id": "libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"product_id": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product": {
"name": "libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"product_id": "libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libre2-11-20240201-150400.9.3.1.x86_64",
"product": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64",
"product_id": "libre2-11-20240201-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"product": {
"name": "libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"product_id": "libre2-11-32bit-20240201-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libupb37-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64",
"product_id": "libupb37-1.60.0-150400.8.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"product": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"product_id": "protobuf-devel-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "protobuf-java-25.1-150400.9.3.1.x86_64",
"product": {
"name": "protobuf-java-25.1-150400.9.3.1.x86_64",
"product_id": "protobuf-java-25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"product": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"product_id": "python311-grpcio-1.60.0-150400.9.3.2.x86_64"
}
},
{
"category": "product_version",
"name": "python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"product": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"product_id": "python311-protobuf-4.25.1-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "re2-devel-20240201-150400.9.3.1.x86_64",
"product": {
"name": "re2-devel-20240201-150400.9.3.1.x86_64",
"product_id": "re2-devel-20240201-150400.9.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "upb-devel-1.60.0-150400.8.3.2.x86_64",
"product": {
"name": "upb-devel-1.60.0-150400.8.3.2.x86_64",
"product_id": "upb-devel-1.60.0-150400.8.3.2.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Installer Updates 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4"
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Installer Updates 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5"
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-development-tools:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Package Hub 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:packagehub:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-public-cloud:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-python3:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy 4.3",
"product": {
"name": "SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_id": "SUSE Linux Enterprise Workstation Extension 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-we:15:sp5"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.3",
"product": {
"name": "openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap Micro 5.4",
"product": {
"name": "openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.5",
"product": {
"name": "openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Installer Updates 15 SP4",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Installer Updates 15 SP5",
"product_id": "SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Installer Updates 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Development Tools 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Development Tools 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Module for Public Cloud 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Public Cloud 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-abseil-1.4.0-150400.9.3.1.noarch as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch"
},
"product_reference": "python311-abseil-1.4.0-150400.9.3.1.noarch",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Module for Python 3 15 SP5",
"product_id": "SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Python 3 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of SUSE Manager Proxy 4.3",
"product_id": "SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap Micro 5.3",
"product_id": "openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap Micro 5.4",
"product_id": "openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "grpc-devel-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "grpc-devel-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-devel-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "grpc-devel-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "grpc-source-1.60.0-150400.8.3.2.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch"
},
"product_reference": "grpc-source-1.60.0-150400.8.3.2.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64"
},
"product_reference": "libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libgrpc37-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libgrpc37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64"
},
"product_reference": "libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-20240201-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libre2-11-32bit-20240201-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64"
},
"product_reference": "libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libupb37-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "libupb37-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch"
},
"product_reference": "opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-devel-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-devel-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-java-25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64"
},
"product_reference": "protobuf-java-25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-java-25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le"
},
"product_reference": "protobuf-java-25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-java-25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x"
},
"product_reference": "protobuf-java-25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "protobuf-java-25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64"
},
"product_reference": "protobuf-java-25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-abseil-1.4.0-150400.9.3.1.noarch as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch"
},
"product_reference": "python311-abseil-1.4.0-150400.9.3.1.noarch",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-grpcio-1.60.0-150400.9.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64"
},
"product_reference": "python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "python311-protobuf-4.25.1-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64"
},
"product_reference": "python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20240201-150400.9.3.1.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64"
},
"product_reference": "re2-devel-20240201-150400.9.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20240201-150400.9.3.1.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le"
},
"product_reference": "re2-devel-20240201-150400.9.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20240201-150400.9.3.1.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x"
},
"product_reference": "re2-devel-20240201-150400.9.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "re2-devel-20240201-150400.9.3.1.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64"
},
"product_reference": "re2-devel-20240201-150400.9.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-150400.8.3.2.aarch64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64"
},
"product_reference": "upb-devel-1.60.0-150400.8.3.2.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-150400.8.3.2.ppc64le as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le"
},
"product_reference": "upb-devel-1.60.0-150400.8.3.2.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-150400.8.3.2.s390x as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x"
},
"product_reference": "upb-devel-1.60.0-150400.8.3.2.s390x",
"relates_to_product_reference": "openSUSE Leap 15.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "upb-devel-1.60.0-150400.8.3.2.x86_64 as component of openSUSE Leap 15.5",
"product_id": "openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64"
},
"product_reference": "upb-devel-1.60.0-150400.8.3.2.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2023-32731",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32731"
}
],
"notes": [
{
"category": "general",
"text": "When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005 \n",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32731",
"url": "https://www.suse.com/security/cve/CVE-2023-32731"
},
{
"category": "external",
"summary": "SUSE Bug 1212180 for CVE-2023-32731",
"url": "https://bugzilla.suse.com/1212180"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.4,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-21T08:37:00Z",
"details": "important"
}
],
"title": "CVE-2023-32731"
},
{
"cve": "CVE-2023-32732",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-32732"
}
],
"notes": [
{
"category": "general",
"text": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in https://github.com/grpc/grpc/pull/32309 https://www.google.com/url",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-32732",
"url": "https://www.suse.com/security/cve/CVE-2023-32732"
},
{
"category": "external",
"summary": "SUSE Bug 1212182 for CVE-2023-32732",
"url": "https://bugzilla.suse.com/1212182"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-21T08:37:00Z",
"details": "moderate"
}
],
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-33953",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-33953"
}
],
"notes": [
{
"category": "general",
"text": "gRPC contains a vulnerability that allows hpack table accounting errors could lead to unwanted disconnects between clients and servers in exceptional cases/ Three vectors were found that allow the following DOS attacks:\n\n- Unbounded memory buffering in the HPACK parser\n- Unbounded CPU consumption in the HPACK parser\n\nThe unbounded CPU consumption is down to a copy that occurred per-input-block in the parser, and because that could be unbounded due to the memory copy bug we end up with an O(n^2) parsing loop, with n selected by the client.\n\nThe unbounded memory buffering bugs:\n\n- The header size limit check was behind the string reading code, so we needed to first buffer up to a 4 gigabyte string before rejecting it as longer than 8 or 16kb.\n- HPACK varints have an encoding quirk whereby an infinite number of 0\u0027s can be added at the start of an integer. gRPC\u0027s hpack parser needed to read all of them before concluding a parse.\n- gRPC\u0027s metadata overflow check was performed per frame, so that the following sequence of frames could cause infinite buffering: HEADERS: containing a: 1 CONTINUATION: containing a: 2 CONTINUATION: containing a: 3 etc\u2026",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-33953",
"url": "https://www.suse.com/security/cve/CVE-2023-33953"
},
{
"category": "external",
"summary": "SUSE Bug 1214148 for CVE-2023-33953",
"url": "https://bugzilla.suse.com/1214148"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-21T08:37:00Z",
"details": "important"
}
],
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-44487",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-44487"
}
],
"notes": [
{
"category": "general",
"text": "The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-44487",
"url": "https://www.suse.com/security/cve/CVE-2023-44487"
},
{
"category": "external",
"summary": "SUSE Bug 1216109 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216109"
},
{
"category": "external",
"summary": "SUSE Bug 1216123 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216123"
},
{
"category": "external",
"summary": "SUSE Bug 1216169 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216169"
},
{
"category": "external",
"summary": "SUSE Bug 1216171 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216171"
},
{
"category": "external",
"summary": "SUSE Bug 1216174 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216174"
},
{
"category": "external",
"summary": "SUSE Bug 1216176 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216176"
},
{
"category": "external",
"summary": "SUSE Bug 1216181 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216181"
},
{
"category": "external",
"summary": "SUSE Bug 1216182 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216182"
},
{
"category": "external",
"summary": "SUSE Bug 1216190 for CVE-2023-44487",
"url": "https://bugzilla.suse.com/1216190"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-21T08:37:00Z",
"details": "important"
}
],
"title": "CVE-2023-44487"
},
{
"cve": "CVE-2023-4785",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2023-4785"
}
],
"notes": [
{
"category": "general",
"text": "Lack of error handling in the TCP server in Google\u0027s gRPC starting version 1.23 on posix-compatible platforms (ex. Linux) allows an attacker to cause a denial of service by initiating a significant number of connections with the server. Note that gRPC C++ Python, and Ruby are affected, but gRPC Java, and Go are NOT affected. ",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2023-4785",
"url": "https://www.suse.com/security/cve/CVE-2023-4785"
},
{
"category": "external",
"summary": "SUSE Bug 1215334 for CVE-2023-4785",
"url": "https://bugzilla.suse.com/1215334"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Installer Updates 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Development Tools 15 SP5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Module for Public Cloud 15 SP5:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Module for Python 3 15 SP5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libupb37-1.60.0-150400.8.3.2.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:protobuf-devel-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"SUSE Manager Proxy 4.3:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libre2-11-20240201-150400.9.3.1.x86_64",
"SUSE Manager Proxy 4.3:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:abseil-cpp-devel-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:grpc-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:grpc-source-1.60.0-150400.8.3.2.noarch",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap 15.5:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libabsl2308_0_0-32bit-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc++1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc1_60-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libgrpc37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf-lite25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotobuf25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotobuf25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libprotoc25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libprotoc25_1_0-32bit-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:libre2-11-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libre2-11-32bit-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:libupb37-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap 15.5:opencensus-proto-source-0.3.0+git.20200721-150400.9.3.1.noarch",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-devel-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:protobuf-java-25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:python311-abseil-1.4.0-150400.9.3.1.noarch",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.aarch64",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.ppc64le",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.s390x",
"openSUSE Leap 15.5:python311-grpcio-1.60.0-150400.9.3.2.x86_64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.s390x",
"openSUSE Leap 15.5:python311-protobuf-4.25.1-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.aarch64",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.ppc64le",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.s390x",
"openSUSE Leap 15.5:re2-devel-20240201-150400.9.3.1.x86_64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.aarch64",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.ppc64le",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.s390x",
"openSUSE Leap 15.5:upb-devel-1.60.0-150400.8.3.2.x86_64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.3:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.3:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.aarch64",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.ppc64le",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.s390x",
"openSUSE Leap Micro 5.4:libabsl2308_0_0-20230802.1-150400.10.4.1.x86_64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.aarch64",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.ppc64le",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.s390x",
"openSUSE Leap Micro 5.4:libprotobuf-lite25_1_0-25.1-150400.9.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2024-02-21T08:37:00Z",
"details": "important"
}
],
"title": "CVE-2023-4785"
}
]
}
GSD-2023-32732
Vulnerability from gsd - Updated: 2023-12-13 01:20{
"GSD": {
"alias": "CVE-2023-32732",
"id": "GSD-2023-32732"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2023-32732"
],
"details": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"id": "GSD-2023-32732",
"modified": "2023-12-13T01:20:23.905919Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2023-32732",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "gRPC",
"version": {
"version_data": [
{
"version_affected": "\u003c",
"version_name": "1.53",
"version_value": "1.54"
}
]
}
}
]
},
"vendor_name": "Google"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n"
}
]
},
"generator": {
"engine": "Vulnogram 0.1.0-dev"
},
"impact": {
"cvss": [
{
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"cweId": "CWE-440",
"lang": "eng",
"value": "CWE-440: Expected Behavior Violation"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/grpc/grpc/pull/32309",
"refsource": "MISC",
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/",
"refsource": "MISC",
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
}
]
},
"solution": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "Fixes available in these releases:\u003cbr\u003e- 1.52.2: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.52.2\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.52.2\u003c/a\u003e\u003cbr\u003e- 1.53.1: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.53.1\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.53.1\u003c/a\u003e\u003cbr\u003e- 1.54.2: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.54.2\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.54.2\u003c/a\u003e\u003cbr\u003e- 1.55.0: \u003ca target=\"_blank\" rel=\"nofollow\" href=\"https://github.com/grpc/grpc/releases/tag/v1.55.0\"\u003ehttps://github.com/grpc/grpc/releases/tag/v1.55.0\u003c/a\u003e\u003cbr\u003e\u003cbr\u003e"
}
],
"value": "Fixes available in these releases:\n- 1.52.2: https://github.com/grpc/grpc/releases/tag/v1.52.2 https://github.com/grpc/grpc/releases/tag/v1.52.2 \n- 1.53.1: https://github.com/grpc/grpc/releases/tag/v1.53.1 https://github.com/grpc/grpc/releases/tag/v1.53.1 \n- 1.54.2: https://github.com/grpc/grpc/releases/tag/v1.54.2 https://github.com/grpc/grpc/releases/tag/v1.54.2 \n- 1.55.0: https://github.com/grpc/grpc/releases/tag/v1.55.0 https://github.com/grpc/grpc/releases/tag/v1.55.0 \n\n"
}
],
"source": {
"discovery": "UNKNOWN"
}
},
"gitlab.com": {
"advisories": [
{
"affected_range": "\u003c1.53.0",
"affected_versions": "All versions before 1.53.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-937"
],
"date": "2023-07-24",
"description": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"fixed_versions": [
"1.53.0"
],
"identifier": "CVE-2023-32732",
"identifiers": [
"GHSA-9hxf-ppjv-w6rq",
"CVE-2023-32732"
],
"not_impacted": "All versions starting from 1.53.0",
"package_slug": "gem/grpc",
"pubdate": "2023-07-06",
"solution": "Upgrade to version 1.53.0 or above.",
"title": "Improper Neutralization",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-32732",
"https://github.com/grpc/grpc/pull/32309",
"https://github.com/grpc/grpc/releases/tag/v1.53.1",
"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/",
"https://github.com/advisories/GHSA-9hxf-ppjv-w6rq"
],
"uuid": "f2ce5529-3809-4636-af98-5fabcf737cf7"
},
{
"affected_range": "(,1.53.0)",
"affected_versions": "All versions before 1.53.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-937"
],
"date": "2023-07-24",
"description": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"fixed_versions": [
"1.53.0"
],
"identifier": "CVE-2023-32732",
"identifiers": [
"GHSA-9hxf-ppjv-w6rq",
"CVE-2023-32732"
],
"not_impacted": "All versions starting from 1.53.0",
"package_slug": "maven/io.grpc/grpc-protobuf",
"pubdate": "2023-07-06",
"solution": "Upgrade to version 1.53.0 or above.",
"title": "Improper Neutralization",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-32732",
"https://github.com/grpc/grpc/pull/32309",
"https://github.com/grpc/grpc/releases/tag/v1.53.1",
"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/",
"https://github.com/advisories/GHSA-9hxf-ppjv-w6rq"
],
"uuid": "8fbe156e-401d-47b7-b1c5-e31029d6c505"
},
{
"affected_range": "\u003c1.53.0",
"affected_versions": "All versions before 1.53.0",
"cvss_v3": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"cwe_ids": [
"CWE-1035",
"CWE-707",
"CWE-937"
],
"date": "2023-07-24",
"description": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n",
"fixed_versions": [
"1.53.0"
],
"identifier": "CVE-2023-32732",
"identifiers": [
"GHSA-9hxf-ppjv-w6rq",
"CVE-2023-32732"
],
"not_impacted": "All versions starting from 1.53.0",
"package_slug": "pypi/grpcio",
"pubdate": "2023-07-06",
"solution": "Upgrade to version 1.53.0 or above.",
"title": "Improper Neutralization",
"urls": [
"https://nvd.nist.gov/vuln/detail/CVE-2023-32732",
"https://github.com/grpc/grpc/pull/32309",
"https://github.com/grpc/grpc/releases/tag/v1.53.1",
"https://github.com/rubysec/ruby-advisory-db/blob/master/gems/grpc/CVE-2023-32732.yml",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/",
"https://github.com/advisories/GHSA-9hxf-ppjv-w6rq"
],
"uuid": "4b329c6e-ca08-464f-9ddc-e489cece39c9"
}
]
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:grpc:grpc:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "1.53.0",
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:37:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:fedoraproject:fedora:38:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@google.com",
"ID": "CVE-2023-32732"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "gRPC contains a vulnerability whereby a client can cause a termination of connection between a HTTP2 proxy and a gRPC server: a base64 encoding error for `-bin` suffixed headers will result in a disconnection by the gRPC server, but is typically allowed by HTTP2 proxies. We recommend upgrading beyond the commit in\u00a0 https://github.com/grpc/grpc/pull/32309 https://www.google.com/url \n"
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-Other"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://github.com/grpc/grpc/pull/32309",
"refsource": "MISC",
"tags": [
"Issue Tracking",
"Patch"
],
"url": "https://github.com/grpc/grpc/pull/32309"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/",
"refsource": "MISC",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/37IDNVY5AWVH7JDMM2SDTL24ZPPZJNSY/"
},
{
"name": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/",
"refsource": "MISC",
"tags": [
"Mailing List"
],
"url": "https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VWE44J5FG7THHL7XVEVTNIGEYBNKJBLL/"
}
]
}
},
"impact": {
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "LOW",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4
}
},
"lastModifiedDate": "2023-08-02T16:43Z",
"publishedDate": "2023-06-09T11:15Z"
}
}
}
WID-SEC-W-2024-1591
Vulnerability from csaf_certbund - Published: 2024-07-10 22:00 - Updated: 2024-11-11 23:00Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungenügende Eingabeüberprüfungen, Unsachgemäße Überprüfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgemäße Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Pufferüberläufe. Diese Schwachstellen ermöglichen Angreifern Denial of Service Zustände zu verursachen, Informationen offenzulegen, Code auszuführen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalität zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig.
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "JUNOS ist das \"Juniper Network Operating System\", das in Juniper Appliances verwendet wird.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein Angreifer kann mehrere Schwachstellen in Juniper JUNOS ausnutzen, um einen Denial of Service zu verursachen, Informationen offenzulegen, Privilegien zu erweitern und Sicherheitsmechanismen inklusive zu umgehen.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2024-1591 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-1591.json"
},
{
"category": "self",
"summary": "WID-SEC-2024-1591 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-1591"
},
{
"category": "external",
"summary": "Juniper Patchday July 2024 vom 2024-07-10",
"url": "https://supportportal.juniper.net/s/global-search/%40uri?language=en_US#sort=%40sfcec_community_publish_date_formula__c%20descending\u0026numberOfResults=100\u0026f:ctype=%5BSecurity%20Advisories%5D"
}
],
"source_lang": "en-US",
"title": "Juniper JUNOS: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2024-11-11T23:00:00.000+00:00",
"generator": {
"date": "2024-11-12T09:31:28.569+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.8"
}
},
"id": "WID-SEC-W-2024-1591",
"initial_release_date": "2024-07-10T22:00:00.000+00:00",
"revision_history": [
{
"date": "2024-07-10T22:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2024-11-11T23:00:00.000+00:00",
"number": "2",
"summary": "URL Kodierung angepasst"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Juniper JUNOS",
"product": {
"name": "Juniper JUNOS",
"product_id": "T036093",
"product_identification_helper": {
"cpe": "cpe:/o:juniper:junos:-"
}
}
}
],
"category": "vendor",
"name": "Juniper"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2006-20001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2006-20001"
},
{
"cve": "CVE-2007-5846",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2007-5846"
},
{
"cve": "CVE-2008-6123",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2008-6123"
},
{
"cve": "CVE-2011-1473",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-1473"
},
{
"cve": "CVE-2011-5094",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2011-5094"
},
{
"cve": "CVE-2012-6151",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2012-6151"
},
{
"cve": "CVE-2014-10064",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-10064"
},
{
"cve": "CVE-2014-2285",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2285"
},
{
"cve": "CVE-2014-2310",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-2310"
},
{
"cve": "CVE-2014-3565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-3565"
},
{
"cve": "CVE-2014-7191",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-7191"
},
{
"cve": "CVE-2014-8882",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2014-8882"
},
{
"cve": "CVE-2015-5621",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-5621"
},
{
"cve": "CVE-2015-8100",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-8100"
},
{
"cve": "CVE-2015-9262",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2015-9262"
},
{
"cve": "CVE-2016-1000232",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-1000232"
},
{
"cve": "CVE-2016-10540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-10540"
},
{
"cve": "CVE-2016-4658",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2016-4658"
},
{
"cve": "CVE-2017-1000048",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-1000048"
},
{
"cve": "CVE-2017-15010",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2017-15010"
},
{
"cve": "CVE-2018-18065",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-18065"
},
{
"cve": "CVE-2018-20834",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-20834"
},
{
"cve": "CVE-2018-3737",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-3737"
},
{
"cve": "CVE-2018-7408",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2018-7408"
},
{
"cve": "CVE-2019-10081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10081"
},
{
"cve": "CVE-2019-10082",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10082"
},
{
"cve": "CVE-2019-10092",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10092"
},
{
"cve": "CVE-2019-10097",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10097"
},
{
"cve": "CVE-2019-10098",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-10098"
},
{
"cve": "CVE-2019-11719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11719"
},
{
"cve": "CVE-2019-11727",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11727"
},
{
"cve": "CVE-2019-11756",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-11756"
},
{
"cve": "CVE-2019-16775",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16775"
},
{
"cve": "CVE-2019-16776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16776"
},
{
"cve": "CVE-2019-16777",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-16777"
},
{
"cve": "CVE-2019-17006",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17006"
},
{
"cve": "CVE-2019-17023",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17023"
},
{
"cve": "CVE-2019-17567",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-17567"
},
{
"cve": "CVE-2019-20149",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20149"
},
{
"cve": "CVE-2019-20892",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-20892"
},
{
"cve": "CVE-2019-9517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2019-9517"
},
{
"cve": "CVE-2020-11668",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11668"
},
{
"cve": "CVE-2020-11984",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11984"
},
{
"cve": "CVE-2020-11993",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-11993"
},
{
"cve": "CVE-2020-12362",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12362"
},
{
"cve": "CVE-2020-12400",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12400"
},
{
"cve": "CVE-2020-12401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12401"
},
{
"cve": "CVE-2020-12402",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12402"
},
{
"cve": "CVE-2020-12403",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-12403"
},
{
"cve": "CVE-2020-13938",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13938"
},
{
"cve": "CVE-2020-13950",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-13950"
},
{
"cve": "CVE-2020-14145",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-14145"
},
{
"cve": "CVE-2020-15861",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15861"
},
{
"cve": "CVE-2020-15862",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-15862"
},
{
"cve": "CVE-2020-1927",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1927"
},
{
"cve": "CVE-2020-1934",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-1934"
},
{
"cve": "CVE-2020-28469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28469"
},
{
"cve": "CVE-2020-28502",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-28502"
},
{
"cve": "CVE-2020-35452",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-35452"
},
{
"cve": "CVE-2020-36049",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-36049"
},
{
"cve": "CVE-2020-6829",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-6829"
},
{
"cve": "CVE-2020-7660",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7660"
},
{
"cve": "CVE-2020-7754",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7754"
},
{
"cve": "CVE-2020-7774",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-7774"
},
{
"cve": "CVE-2020-8648",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-8648"
},
{
"cve": "CVE-2020-9490",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2020-9490"
},
{
"cve": "CVE-2021-22543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-22543"
},
{
"cve": "CVE-2021-2342",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2342"
},
{
"cve": "CVE-2021-23440",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-23440"
},
{
"cve": "CVE-2021-2356",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2356"
},
{
"cve": "CVE-2021-2372",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2372"
},
{
"cve": "CVE-2021-2385",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2385"
},
{
"cve": "CVE-2021-2389",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2389"
},
{
"cve": "CVE-2021-2390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-2390"
},
{
"cve": "CVE-2021-25745",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25745"
},
{
"cve": "CVE-2021-25746",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25746"
},
{
"cve": "CVE-2021-25748",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-25748"
},
{
"cve": "CVE-2021-26690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26690"
},
{
"cve": "CVE-2021-26691",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-26691"
},
{
"cve": "CVE-2021-27290",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-27290"
},
{
"cve": "CVE-2021-29469",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-29469"
},
{
"cve": "CVE-2021-30641",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-30641"
},
{
"cve": "CVE-2021-31535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31535"
},
{
"cve": "CVE-2021-31618",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-31618"
},
{
"cve": "CVE-2021-3177",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3177"
},
{
"cve": "CVE-2021-32803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32803"
},
{
"cve": "CVE-2021-32804",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-32804"
},
{
"cve": "CVE-2021-33033",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33033"
},
{
"cve": "CVE-2021-33034",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33034"
},
{
"cve": "CVE-2021-33193",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33193"
},
{
"cve": "CVE-2021-3347",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3347"
},
{
"cve": "CVE-2021-33909",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-33909"
},
{
"cve": "CVE-2021-34798",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-34798"
},
{
"cve": "CVE-2021-35604",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35604"
},
{
"cve": "CVE-2021-35624",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-35624"
},
{
"cve": "CVE-2021-36160",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-36160"
},
{
"cve": "CVE-2021-37701",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37701"
},
{
"cve": "CVE-2021-37712",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37712"
},
{
"cve": "CVE-2021-37713",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-37713"
},
{
"cve": "CVE-2021-3803",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-3803"
},
{
"cve": "CVE-2021-39275",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-39275"
},
{
"cve": "CVE-2021-40438",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-40438"
},
{
"cve": "CVE-2021-41524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41524"
},
{
"cve": "CVE-2021-41773",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-41773"
},
{
"cve": "CVE-2021-42013",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-42013"
},
{
"cve": "CVE-2021-43527",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-43527"
},
{
"cve": "CVE-2021-44224",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44224"
},
{
"cve": "CVE-2021-44225",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44225"
},
{
"cve": "CVE-2021-44790",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44790"
},
{
"cve": "CVE-2021-44906",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2021-44906"
},
{
"cve": "CVE-2022-21245",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21245"
},
{
"cve": "CVE-2022-21270",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21270"
},
{
"cve": "CVE-2022-21303",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21303"
},
{
"cve": "CVE-2022-21304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21304"
},
{
"cve": "CVE-2022-21344",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21344"
},
{
"cve": "CVE-2022-21367",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21367"
},
{
"cve": "CVE-2022-21417",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21417"
},
{
"cve": "CVE-2022-21427",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21427"
},
{
"cve": "CVE-2022-21444",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21444"
},
{
"cve": "CVE-2022-21451",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21451"
},
{
"cve": "CVE-2022-21454",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21454"
},
{
"cve": "CVE-2022-21460",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21460"
},
{
"cve": "CVE-2022-21589",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21589"
},
{
"cve": "CVE-2022-21592",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21592"
},
{
"cve": "CVE-2022-21595",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21595"
},
{
"cve": "CVE-2022-21608",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21608"
},
{
"cve": "CVE-2022-21617",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-21617"
},
{
"cve": "CVE-2022-22719",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22719"
},
{
"cve": "CVE-2022-22720",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22720"
},
{
"cve": "CVE-2022-22721",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22721"
},
{
"cve": "CVE-2022-22822",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22822"
},
{
"cve": "CVE-2022-22823",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22823"
},
{
"cve": "CVE-2022-22824",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-22824"
},
{
"cve": "CVE-2022-23471",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23471"
},
{
"cve": "CVE-2022-23524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23524"
},
{
"cve": "CVE-2022-23525",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23525"
},
{
"cve": "CVE-2022-23526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23526"
},
{
"cve": "CVE-2022-23852",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23852"
},
{
"cve": "CVE-2022-23943",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-23943"
},
{
"cve": "CVE-2022-25147",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25147"
},
{
"cve": "CVE-2022-25235",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25235"
},
{
"cve": "CVE-2022-25236",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25236"
},
{
"cve": "CVE-2022-2526",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-2526"
},
{
"cve": "CVE-2022-25315",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-25315"
},
{
"cve": "CVE-2022-26377",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-26377"
},
{
"cve": "CVE-2022-28330",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28330"
},
{
"cve": "CVE-2022-28614",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28614"
},
{
"cve": "CVE-2022-28615",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-28615"
},
{
"cve": "CVE-2022-29167",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29167"
},
{
"cve": "CVE-2022-29404",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-29404"
},
{
"cve": "CVE-2022-30522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30522"
},
{
"cve": "CVE-2022-30556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-30556"
},
{
"cve": "CVE-2022-31813",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-31813"
},
{
"cve": "CVE-2022-3517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3517"
},
{
"cve": "CVE-2022-3564",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-3564"
},
{
"cve": "CVE-2022-36760",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-36760"
},
{
"cve": "CVE-2022-37434",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37434"
},
{
"cve": "CVE-2022-37436",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-37436"
},
{
"cve": "CVE-2022-40674",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-40674"
},
{
"cve": "CVE-2022-41741",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41741"
},
{
"cve": "CVE-2022-41742",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-41742"
},
{
"cve": "CVE-2022-4203",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4203"
},
{
"cve": "CVE-2022-4304",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4304"
},
{
"cve": "CVE-2022-4450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4450"
},
{
"cve": "CVE-2022-46663",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-46663"
},
{
"cve": "CVE-2022-4886",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2022-4886"
},
{
"cve": "CVE-2023-0215",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0215"
},
{
"cve": "CVE-2023-0216",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0216"
},
{
"cve": "CVE-2023-0217",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0217"
},
{
"cve": "CVE-2023-0286",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0286"
},
{
"cve": "CVE-2023-0401",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0401"
},
{
"cve": "CVE-2023-0464",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0464"
},
{
"cve": "CVE-2023-0465",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0465"
},
{
"cve": "CVE-2023-0466",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0466"
},
{
"cve": "CVE-2023-0767",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-0767"
},
{
"cve": "CVE-2023-1255",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-1255"
},
{
"cve": "CVE-2023-2002",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2002"
},
{
"cve": "CVE-2023-20593",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-20593"
},
{
"cve": "CVE-2023-21830",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21830"
},
{
"cve": "CVE-2023-21840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21840"
},
{
"cve": "CVE-2023-21843",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21843"
},
{
"cve": "CVE-2023-21912",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21912"
},
{
"cve": "CVE-2023-21963",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21963"
},
{
"cve": "CVE-2023-21980",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-21980"
},
{
"cve": "CVE-2023-22025",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22025"
},
{
"cve": "CVE-2023-22067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22067"
},
{
"cve": "CVE-2023-22081",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22081"
},
{
"cve": "CVE-2023-22652",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-22652"
},
{
"cve": "CVE-2023-24329",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-24329"
},
{
"cve": "CVE-2023-25153",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25153"
},
{
"cve": "CVE-2023-25173",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25173"
},
{
"cve": "CVE-2023-25690",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-25690"
},
{
"cve": "CVE-2023-2700",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2700"
},
{
"cve": "CVE-2023-27522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-27522"
},
{
"cve": "CVE-2023-2828",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2828"
},
{
"cve": "CVE-2023-28840",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28840"
},
{
"cve": "CVE-2023-28841",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28841"
},
{
"cve": "CVE-2023-28842",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-28842"
},
{
"cve": "CVE-2023-2975",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-2975"
},
{
"cve": "CVE-2023-30079",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30079"
},
{
"cve": "CVE-2023-30630",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-30630"
},
{
"cve": "CVE-2023-3090",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3090"
},
{
"cve": "CVE-2023-32067",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32067"
},
{
"cve": "CVE-2023-32360",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32360"
},
{
"cve": "CVE-2023-32435",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32435"
},
{
"cve": "CVE-2023-32439",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32439"
},
{
"cve": "CVE-2023-32732",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-32732"
},
{
"cve": "CVE-2023-3341",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3341"
},
{
"cve": "CVE-2023-3390",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3390"
},
{
"cve": "CVE-2023-33953",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-33953"
},
{
"cve": "CVE-2023-34058",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34058"
},
{
"cve": "CVE-2023-34059",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34059"
},
{
"cve": "CVE-2023-3446",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3446"
},
{
"cve": "CVE-2023-34969",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-34969"
},
{
"cve": "CVE-2023-35001",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35001"
},
{
"cve": "CVE-2023-35788",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-35788"
},
{
"cve": "CVE-2023-3611",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3611"
},
{
"cve": "CVE-2023-37450",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-37450"
},
{
"cve": "CVE-2023-3776",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3776"
},
{
"cve": "CVE-2023-3817",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-3817"
},
{
"cve": "CVE-2023-4004",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4004"
},
{
"cve": "CVE-2023-4206",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4206"
},
{
"cve": "CVE-2023-4207",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4207"
},
{
"cve": "CVE-2023-4208",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4208"
},
{
"cve": "CVE-2023-42753",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-42753"
},
{
"cve": "CVE-2023-4785",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4785"
},
{
"cve": "CVE-2023-4807",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4807"
},
{
"cve": "CVE-2023-4863",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-4863"
},
{
"cve": "CVE-2023-5043",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5043"
},
{
"cve": "CVE-2023-5129",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5129"
},
{
"cve": "CVE-2023-5363",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2023-5363"
},
{
"cve": "CVE-2024-20918",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20918"
},
{
"cve": "CVE-2024-20919",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20919"
},
{
"cve": "CVE-2024-20921",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20921"
},
{
"cve": "CVE-2024-20926",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20926"
},
{
"cve": "CVE-2024-20932",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20932"
},
{
"cve": "CVE-2024-20945",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20945"
},
{
"cve": "CVE-2024-20952",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-20952"
},
{
"cve": "CVE-2024-39511",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39511"
},
{
"cve": "CVE-2024-39512",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39512"
},
{
"cve": "CVE-2024-39513",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39513"
},
{
"cve": "CVE-2024-39514",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39514"
},
{
"cve": "CVE-2024-39517",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39517"
},
{
"cve": "CVE-2024-39518",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39518"
},
{
"cve": "CVE-2024-39519",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39519"
},
{
"cve": "CVE-2024-39520",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39520"
},
{
"cve": "CVE-2024-39521",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39521"
},
{
"cve": "CVE-2024-39522",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39522"
},
{
"cve": "CVE-2024-39523",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39523"
},
{
"cve": "CVE-2024-39524",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39524"
},
{
"cve": "CVE-2024-39528",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39528"
},
{
"cve": "CVE-2024-39529",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39529"
},
{
"cve": "CVE-2024-39530",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39530"
},
{
"cve": "CVE-2024-39531",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39531"
},
{
"cve": "CVE-2024-39532",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39532"
},
{
"cve": "CVE-2024-39533",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39533"
},
{
"cve": "CVE-2024-39535",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39535"
},
{
"cve": "CVE-2024-39536",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39536"
},
{
"cve": "CVE-2024-39537",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39537"
},
{
"cve": "CVE-2024-39538",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39538"
},
{
"cve": "CVE-2024-39539",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39539"
},
{
"cve": "CVE-2024-39540",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39540"
},
{
"cve": "CVE-2024-39541",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39541"
},
{
"cve": "CVE-2024-39542",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39542"
},
{
"cve": "CVE-2024-39543",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39543"
},
{
"cve": "CVE-2024-39545",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39545"
},
{
"cve": "CVE-2024-39546",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39546"
},
{
"cve": "CVE-2024-39548",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39548"
},
{
"cve": "CVE-2024-39549",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39549"
},
{
"cve": "CVE-2024-39550",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39550"
},
{
"cve": "CVE-2024-39551",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39551"
},
{
"cve": "CVE-2024-39553",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39553"
},
{
"cve": "CVE-2024-39554",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39554"
},
{
"cve": "CVE-2024-39555",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39555"
},
{
"cve": "CVE-2024-39556",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39556"
},
{
"cve": "CVE-2024-39557",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39557"
},
{
"cve": "CVE-2024-39558",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39558"
},
{
"cve": "CVE-2024-39559",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39559"
},
{
"cve": "CVE-2024-39560",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39560"
},
{
"cve": "CVE-2024-39561",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39561"
},
{
"cve": "CVE-2024-39565",
"notes": [
{
"category": "description",
"text": "Es existieren mehrere Schwachstellen in verschiedenen Juniper-Produkten. Ursachen sind unter Anderem Ungen\u00fcgende Eingabe\u00fcberpr\u00fcfungen, Unsachgem\u00e4\u00dfe \u00dcberpr\u00fcfung und Verarbeitung von Paketen, fehlende Speicherfreigaben, fehlerhafte Behandlung von Ausnahmen, Unsachgem\u00e4\u00dfe Speicherbehandlung, unkontrollierter Ressourcenverbrauch, Klartextspeicherung von Daten und Puffer\u00fcberl\u00e4ufe. Diese Schwachstellen erm\u00f6glichen Angreifern Denial of Service Zust\u00e4nde zu verursachen, Informationen offenzulegen, Code auszuf\u00fchren, Privilegien zu erweitern und Sicherheitsmechanismen inklusive der Firewall Funktionalit\u00e4t zu umgehen. Zu einer erfolgreichen Ausnutzung einiger dieser Schwachstellen ist eine Anmeldung oder eine Interaktion des Nutzers notwendig."
}
],
"product_status": {
"known_affected": [
"T036093"
]
},
"release_date": "2024-07-10T22:00:00.000+00:00",
"title": "CVE-2024-39565"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.