Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-64505 (GCVE-0-2025-64505)
Vulnerability from cvelistv5 – Published: 2025-11-24 23:38 – Updated: 2025-11-25 18:55- CWE-125 - Out-of-bounds Read
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-64505",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-11-25T18:55:44.084881Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-11-25T18:55:50.619Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "libpng",
"vendor": "pnggroup",
"versions": [
{
"status": "affected",
"version": "\u003c 1.6.51"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-125",
"description": "CWE-125: Out-of-bounds Read",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-11-24T23:38:40.405Z",
"orgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"shortName": "GitHub_M"
},
"references": [
{
"name": "https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42",
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42"
},
{
"name": "https://github.com/pnggroup/libpng/pull/748",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pnggroup/libpng/pull/748"
},
{
"name": "https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37",
"tags": [
"x_refsource_MISC"
],
"url": "https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37"
}
],
"source": {
"advisory": "GHSA-4952-h5wq-4m42",
"discovery": "UNKNOWN"
},
"title": "LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index"
}
},
"cveMetadata": {
"assignerOrgId": "a0819718-46f1-4df5-94e2-005712e83aaa",
"assignerShortName": "GitHub_M",
"cveId": "CVE-2025-64505",
"datePublished": "2025-11-24T23:38:40.405Z",
"dateReserved": "2025-11-05T19:12:25.104Z",
"dateUpdated": "2025-11-25T18:55:50.619Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.2",
"vulnerability-lookup:meta": {
"nvd": "{\"cve\":{\"id\":\"CVE-2025-64505\",\"sourceIdentifier\":\"security-advisories@github.com\",\"published\":\"2025-11-25T00:15:47.133\",\"lastModified\":\"2025-11-26T18:28:32.220\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2}]},\"weaknesses\":[{\"source\":\"security-advisories@github.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-125\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"1.6.51\",\"matchCriteriaId\":\"A8B5D980-7DA8-4291-8723-4CDDF73B19F6\"}]}]}],\"references\":[{\"url\":\"https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Patch\"]},{\"url\":\"https://github.com/pnggroup/libpng/pull/748\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Issue Tracking\"]},{\"url\":\"https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42\",\"source\":\"security-advisories@github.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-64505\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-11-25T18:55:44.084881Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-11-25T18:55:48.097Z\"}}], \"cna\": {\"title\": \"LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index\", \"source\": {\"advisory\": \"GHSA-4952-h5wq-4m42\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.1, \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"LOW\"}}], \"affected\": [{\"vendor\": \"pnggroup\", \"product\": \"libpng\", \"versions\": [{\"status\": \"affected\", \"version\": \"\u003c 1.6.51\"}]}], \"references\": [{\"url\": \"https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42\", \"name\": \"https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"https://github.com/pnggroup/libpng/pull/748\", \"name\": \"https://github.com/pnggroup/libpng/pull/748\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37\", \"name\": \"https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-125\", \"description\": \"CWE-125: Out-of-bounds Read\"}]}], \"providerMetadata\": {\"orgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"shortName\": \"GitHub_M\", \"dateUpdated\": \"2025-11-24T23:38:40.405Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-64505\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-11-25T18:55:50.619Z\", \"dateReserved\": \"2025-11-05T19:12:25.104Z\", \"assignerOrgId\": \"a0819718-46f1-4df5-94e2-005712e83aaa\", \"datePublished\": \"2025-11-24T23:38:40.405Z\", \"assignerShortName\": \"GitHub_M\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.2"
}
}
}
CERTFR-2025-AVI-1064
Vulnerability from certfr_avis - Published: 2025-12-04 - Updated: 2025-12-04
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cups 2.3.3op2-10 | ||
| Microsoft | N/A | cbl2 grub2 2.06-15 | ||
| Microsoft | N/A | cbl2 nodejs18 18.20.3-9 | ||
| Microsoft | N/A | cbl2 fluent-bit versions antérieures à 3.0.6-5 | ||
| Microsoft | N/A | azl3 kernel versions antérieures à 6.6.117.1-1 | ||
| Microsoft | N/A | azl3 kubevirt 1.5.0-5 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 nodejs 20.14.0-9 | ||
| Microsoft | N/A | azl3 glib versions antérieures à 2.78.6-5 | ||
| Microsoft | N/A | azl3 grub2 2.06-25 | ||
| Microsoft | N/A | azl3 libxslt 1.1.43-1 | ||
| Microsoft | N/A | azl3 expat 2.6.4-2 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | cbl2 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | cbl2 libxslt 1.1.34-8 | ||
| Microsoft | N/A | azl3 cups 2.4.13-1 | ||
| Microsoft | N/A | cbl2 haproxy versions antérieures à 2.4.24-2 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | azl3 haproxy versions antérieures à 2.9.11-4 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 fluent-bit 3.1.9-6 | ||
| Microsoft | N/A | azl3 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-5 | ||
| Microsoft | N/A | cbl2 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | cbl2 glib versions antérieures à 2.71.0-8 | ||
| Microsoft | N/A | cbl2 kubevirt versions antérieures à 0.59.0-31 | ||
| Microsoft | N/A | azl3 libvirt versions antérieures à 10.0.0-6 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cups 2.3.3op2-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 grub2 2.06-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 nodejs18 18.20.3-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 fluent-bit versions ant\u00e9rieures \u00e0 3.0.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel versions ant\u00e9rieures \u00e0 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubevirt 1.5.0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nodejs 20.14.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glib versions ant\u00e9rieures \u00e0 2.78.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 grub2 2.06-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libxslt 1.1.43-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 expat 2.6.4-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libxslt 1.1.34-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cups 2.4.13-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 haproxy versions ant\u00e9rieures \u00e0 2.4.24-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 haproxy versions ant\u00e9rieures \u00e0 2.9.11-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 fluent-bit 3.1.9-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 glib versions ant\u00e9rieures \u00e0 2.71.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt versions ant\u00e9rieures \u00e0 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libvirt versions ant\u00e9rieures \u00e0 10.0.0-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-13193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13193"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2025-61915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61915"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-12977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12977"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-12970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12970"
},
{
"name": "CVE-2025-12638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12638"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-64704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64704"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-64713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64713"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2025-64324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64324"
},
{
"name": "CVE-2025-12969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12969"
},
{
"name": "CVE-2025-11230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11230"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
}
],
"initial_release_date": "2025-12-04T00:00:00",
"last_revision_date": "2025-12-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1064",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61661",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61661"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13230"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40210"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13227"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61915"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64720"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12816"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64704"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54770"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66221"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13601",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13601"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64713"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65018",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65018"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66030"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40211"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50233"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66382"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61664"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58436",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58436"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13193"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61662",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61662"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-38656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38656"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11230"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54771"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13226"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12638",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12638"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12970"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66031"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12977"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61663"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12969"
},
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64324"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64506"
},
{
"published_at": "2025-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10158"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64505",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64505"
}
]
}
CERTFR-2026-AVI-0070
Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Parser) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Connectors (Connector/ODBC) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Docker Images) versions 8.4.0 à 8.4.7 | ||
| Oracle | MySQL | MySQL Server (Server: DDL) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.36, 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Connectors (Connector/C++) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Pluggable Auth) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: Parser) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/ODBC) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Docker Images) versions 8.4.0 \u00e0 8.4.7",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.36, 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/C++) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Pluggable Auth) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2026-21949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21949"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2026-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21950"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21929"
},
{
"name": "CVE-2026-21952",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21952"
},
{
"name": "CVE-2026-21965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21965"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
}
],
"initial_release_date": "2026-01-21T00:00:00",
"last_revision_date": "2026-01-21T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0070",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2026",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
]
}
CERTFR-2026-AVI-0112
Vulnerability from certfr_avis - Published: 2026-02-02 - Updated: 2026-02-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.7 | ||
| VMware | Tanzu Kubernetes Grid Integrated Edition | Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions antérieures à 1.24.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.7+LTS-T | ||
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.74 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.3 | ||
| VMware | Tanzu Platform | Telemetry pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions antérieures à 5.4.0 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions ant\u00e9rieures \u00e0 1.24.0",
"product": {
"name": "Tanzu Kubernetes Grid Integrated Edition",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.7+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.74",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2026-24882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24882"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2022-49390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-14762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14762"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-6966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6966"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2025-67499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67499"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23419"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-24881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24881"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-02T00:00:00",
"last_revision_date": "2026-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36902",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36902"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36908",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36908"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36897",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36897"
},
{
"published_at": "2026-02-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36912",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36912"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36904",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36904"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36900",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36900"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36903",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36903"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36909",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36909"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36899",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36899"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36906",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36906"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36907",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36907"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36901",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36901"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36905",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36905"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36898",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36898"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36910",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36910"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36911",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36911"
}
]
}
CERTFR-2026-AVI-0070
Vulnerability from certfr_avis - Published: 2026-01-21 - Updated: 2026-01-21
De multiples vulnérabilités ont été découvertes dans Oracle MySQL. Elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et une atteinte à l'intégrité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Oracle | MySQL | MySQL Server (Server: Parser) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Packaging) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Connectors (Connector/ODBC) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Docker Images) versions 8.4.0 à 8.4.7 | ||
| Oracle | MySQL | MySQL Server (Server: DDL) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (InnoDB) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Enterprise Backup versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Cluster versions 7.6.0 à 7.6.36, 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Connectors (Connector/C++) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Thread Pooling) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Workbench versions 8.0.0 à 8.0.45 | ||
| Oracle | MySQL | MySQL Server (Server: Pluggable Auth) versions 9.0.0 à 9.5.0 | ||
| Oracle | MySQL | MySQL Server (Server: Optimizer) versions 8.0.0 à 8.0.44, 8.4.0 à 8.4.7 et 9.0.0 à 9.5.0 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "MySQL Server (Server: Parser) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Packaging) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/ODBC) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Docker Images) versions 8.4.0 \u00e0 8.4.7",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: DDL) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (InnoDB) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Enterprise Backup versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Cluster versions 7.6.0 \u00e0 7.6.36, 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Connectors (Connector/C++) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Thread Pooling) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Workbench versions 8.0.0 \u00e0 8.0.45",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Pluggable Auth) versions 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
},
{
"description": "MySQL Server (Server: Optimizer) versions 8.0.0 \u00e0 8.0.44, 8.4.0 \u00e0 8.4.7 et 9.0.0 \u00e0 9.5.0",
"product": {
"name": "MySQL",
"vendor": {
"name": "Oracle",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2026-21936",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21936"
},
{
"name": "CVE-2026-21937",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21937"
},
{
"name": "CVE-2026-21949",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21949"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2026-21948",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21948"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2026-21964",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21964"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2026-21950",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21950"
},
{
"name": "CVE-2026-21968",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21968"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2026-21929",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21929"
},
{
"name": "CVE-2026-21952",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21952"
},
{
"name": "CVE-2026-21965",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21965"
},
{
"name": "CVE-2026-21941",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21941"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
}
],
"initial_release_date": "2026-01-21T00:00:00",
"last_revision_date": "2026-01-21T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0070",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-01-21T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Oracle MySQL. Elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Oracle MySQL",
"vendor_advisories": [
{
"published_at": "2026-01-20",
"title": "Bulletin de s\u00e9curit\u00e9 Oracle MySQL cpujan2026",
"url": "https://www.oracle.com/security-alerts/cpujan2026.html"
}
]
}
CERTFR-2025-AVI-1064
Vulnerability from certfr_avis - Published: 2025-12-04 - Updated: 2025-12-04
De multiples vulnérabilités ont été découvertes dans les produits Microsoft. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Microsoft | N/A | cbl2 cups 2.3.3op2-10 | ||
| Microsoft | N/A | cbl2 grub2 2.06-15 | ||
| Microsoft | N/A | cbl2 nodejs18 18.20.3-9 | ||
| Microsoft | N/A | cbl2 fluent-bit versions antérieures à 3.0.6-5 | ||
| Microsoft | N/A | azl3 kernel versions antérieures à 6.6.117.1-1 | ||
| Microsoft | N/A | azl3 kubevirt 1.5.0-5 | ||
| Microsoft | N/A | cbl2 python-tensorboard 2.11.0-3 | ||
| Microsoft | N/A | azl3 nodejs 20.14.0-9 | ||
| Microsoft | N/A | azl3 glib versions antérieures à 2.78.6-5 | ||
| Microsoft | N/A | azl3 grub2 2.06-25 | ||
| Microsoft | N/A | azl3 libxslt 1.1.43-1 | ||
| Microsoft | N/A | azl3 expat 2.6.4-2 | ||
| Microsoft | N/A | azl3 python-tensorboard 2.16.2-6 | ||
| Microsoft | N/A | cbl2 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | cbl2 libxslt 1.1.34-8 | ||
| Microsoft | N/A | azl3 cups 2.4.13-1 | ||
| Microsoft | N/A | cbl2 haproxy versions antérieures à 2.4.24-2 | ||
| Microsoft | N/A | cbl2 kernel 5.15.186.1-1 | ||
| Microsoft | N/A | azl3 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | azl3 haproxy versions antérieures à 2.9.11-4 | ||
| Microsoft | N/A | azl3 tensorflow 2.16.1-9 | ||
| Microsoft | N/A | azl3 fluent-bit 3.1.9-6 | ||
| Microsoft | N/A | azl3 rsync versions antérieures à 3.4.1-2 | ||
| Microsoft | N/A | azl3 keras 3.3.3-5 | ||
| Microsoft | N/A | cbl2 libpng versions antérieures à 1.6.51-1 | ||
| Microsoft | N/A | cbl2 glib versions antérieures à 2.71.0-8 | ||
| Microsoft | N/A | cbl2 kubevirt versions antérieures à 0.59.0-31 | ||
| Microsoft | N/A | azl3 libvirt versions antérieures à 10.0.0-6 | ||
| Microsoft | N/A | cbl2 reaper 3.1.1-19 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "cbl2 cups 2.3.3op2-10",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 grub2 2.06-15",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 nodejs18 18.20.3-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 fluent-bit versions ant\u00e9rieures \u00e0 3.0.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kernel versions ant\u00e9rieures \u00e0 6.6.117.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 kubevirt 1.5.0-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 python-tensorboard 2.11.0-3",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 nodejs 20.14.0-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 glib versions ant\u00e9rieures \u00e0 2.78.6-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 grub2 2.06-25",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libxslt 1.1.43-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 expat 2.6.4-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 python-tensorboard 2.16.2-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libxslt 1.1.34-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 cups 2.4.13-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 haproxy versions ant\u00e9rieures \u00e0 2.4.24-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kernel 5.15.186.1-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 haproxy versions ant\u00e9rieures \u00e0 2.9.11-4",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 fluent-bit 3.1.9-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 rsync versions ant\u00e9rieures \u00e0 3.4.1-2",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 keras 3.3.3-5",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 libpng versions ant\u00e9rieures \u00e0 1.6.51-1",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 glib versions ant\u00e9rieures \u00e0 2.71.0-8",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 kubevirt versions ant\u00e9rieures \u00e0 0.59.0-31",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "azl3 libvirt versions ant\u00e9rieures \u00e0 10.0.0-6",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
},
{
"description": "cbl2 reaper 3.1.1-19",
"product": {
"name": "N/A",
"vendor": {
"name": "Microsoft",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-58436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58436"
},
{
"name": "CVE-2025-12816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12816"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2025-13226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13226"
},
{
"name": "CVE-2025-13193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13193"
},
{
"name": "CVE-2025-54770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54770"
},
{
"name": "CVE-2025-61915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61915"
},
{
"name": "CVE-2025-61662",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61662"
},
{
"name": "CVE-2025-66031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66031"
},
{
"name": "CVE-2025-12977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12977"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-61663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61663"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-12970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12970"
},
{
"name": "CVE-2025-12638",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12638"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-38656",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38656"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-40210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40210"
},
{
"name": "CVE-2025-66030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66030"
},
{
"name": "CVE-2025-64704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64704"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-10158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10158"
},
{
"name": "CVE-2025-64713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64713"
},
{
"name": "CVE-2025-66221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66221"
},
{
"name": "CVE-2025-13230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13230"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-54771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54771"
},
{
"name": "CVE-2025-40211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40211"
},
{
"name": "CVE-2025-13227",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13227"
},
{
"name": "CVE-2025-64324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64324"
},
{
"name": "CVE-2025-12969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12969"
},
{
"name": "CVE-2025-11230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11230"
},
{
"name": "CVE-2025-61661",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61661"
},
{
"name": "CVE-2022-50233",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50233"
},
{
"name": "CVE-2025-61664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61664"
}
],
"initial_release_date": "2025-12-04T00:00:00",
"last_revision_date": "2025-12-04T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-1064",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-12-04T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Microsoft. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Microsoft",
"vendor_advisories": [
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61661",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61661"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13230"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40210",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40210"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13227",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13227"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61915",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61915"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64720",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64720"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12816",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12816"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64704",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64704"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54770",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54770"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11731",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11731"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66221",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66221"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13601",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13601"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64713",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64713"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-65018",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-65018"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66030",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66030"
},
{
"published_at": "2025-11-22",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-40211",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-40211"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2022-50233",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-50233"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66382",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66382"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61664",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61664"
},
{
"published_at": "2025-11-30",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-58436",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-58436"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13193",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13193"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61662",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61662"
},
{
"published_at": "2025-11-28",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-38656",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-38656"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-11230",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-11230"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-54771",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-54771"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-13226",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-13226"
},
{
"published_at": "2025-12-03",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12638",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12638"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12970",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12970"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-66031",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-66031"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12977",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12977"
},
{
"published_at": "2025-11-21",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-61663",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-61663"
},
{
"published_at": "2025-11-29",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-12969",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-12969"
},
{
"published_at": "2025-11-20",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64324",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64324"
},
{
"published_at": "2025-11-27",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64506",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64506"
},
{
"published_at": "2025-11-19",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-10158",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-10158"
},
{
"published_at": "2025-11-26",
"title": "Bulletin de s\u00e9curit\u00e9 Microsoft CVE-2025-64505",
"url": "https://msrc.microsoft.com/update-guide/vulnerability/CVE-2025-64505"
}
]
}
CERTFR-2026-AVI-0218
Vulnerability from certfr_avis - Published: 2026-02-26 - Updated: 2026-02-26
De multiples vulnérabilités ont été découvertes dans les produits VMware. Certaines d'entre elles permettent à un attaquant de provoquer un déni de service à distance, une atteinte à la confidentialité des données et un contournement de la politique de sécurité.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Kubernetes Runtime | Platform Services pour Tanzu Platform versions antérieures à 10.3.5 | ||
| VMware | Tanzu Kubernetes Runtime | Tanzu Hub versions antérieures à 10.3.5 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 16.x antérieures à 16.12.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 4.3.2 sur Kubernetes | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 18.x antérieures à 18.2.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Noble) versions antérieures à 1.238.x | ||
| VMware | Workstation | Workstation versions antérieures à 25H2u1 | ||
| VMware | Fusion | Fusion versions antérieures à 25H2u1 sur MacOS | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Ubuntu Jammy) versions antérieures à 1.1065.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 15.x antérieures à 15.16.0 | ||
| VMware | Tanzu Kubernetes Runtime | Stemcells (Windows) versions antérieures à 2019.95.x | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions 17.x antérieures à 17.8.0 | ||
| VMware | Tanzu Data Intelligence | Tanzu pour Postgres versions antérieures à 14.21.0 |
| Title | Publication Time | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Platform Services pour Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Hub versions ant\u00e9rieures \u00e0 10.3.5",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 16.x ant\u00e9rieures \u00e0 16.12.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 4.3.2 sur Kubernetes",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 18.x ant\u00e9rieures \u00e0 18.2.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Noble) versions ant\u00e9rieures \u00e0 1.238.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation versions ant\u00e9rieures \u00e0 25H2u1",
"product": {
"name": "Workstation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion versions ant\u00e9rieures \u00e0 25H2u1 sur MacOS",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Ubuntu Jammy) versions ant\u00e9rieures \u00e0 1.1065.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 15.x ant\u00e9rieures \u00e0 15.16.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Stemcells (Windows) versions ant\u00e9rieures \u00e0 2019.95.x",
"product": {
"name": "Tanzu Kubernetes Runtime",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions 17.x ant\u00e9rieures \u00e0 17.8.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu pour Postgres versions ant\u00e9rieures \u00e0 14.21.0",
"product": {
"name": "Tanzu Data Intelligence",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2019-25013",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-25013"
},
{
"name": "CVE-2017-9937",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-9937"
},
{
"name": "CVE-2025-6395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6395"
},
{
"name": "CVE-2026-22722",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22722"
},
{
"name": "CVE-2023-52356",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52356"
},
{
"name": "CVE-2013-4235",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4235"
},
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2017-3613",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3613"
},
{
"name": "CVE-2021-22898",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22898"
},
{
"name": "CVE-2025-38490",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38490"
},
{
"name": "CVE-2025-37850",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37850"
},
{
"name": "CVE-2025-66865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66865"
},
{
"name": "CVE-2022-35252",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35252"
},
{
"name": "CVE-2005-0602",
"url": "https://www.cve.org/CVERecord?id=CVE-2005-0602"
},
{
"name": "CVE-2025-61730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61730"
},
{
"name": "CVE-2025-38485",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38485"
},
{
"name": "CVE-2025-22026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22026"
},
{
"name": "CVE-2025-39987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39987"
},
{
"name": "CVE-2025-62727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62727"
},
{
"name": "CVE-2015-4789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4789"
},
{
"name": "CVE-2025-38579",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38579"
},
{
"name": "CVE-2025-37761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37761"
},
{
"name": "CVE-2025-21861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21861"
},
{
"name": "CVE-2025-37865",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37865"
},
{
"name": "CVE-2025-38328",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38328"
},
{
"name": "CVE-2026-21933",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21933"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2024-7006",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7006"
},
{
"name": "CVE-2026-21932",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21932"
},
{
"name": "CVE-2023-3316",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3316"
},
{
"name": "CVE-2025-15282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15282"
},
{
"name": "CVE-2025-38711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38711"
},
{
"name": "CVE-2025-38487",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38487"
},
{
"name": "CVE-2024-9681",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9681"
},
{
"name": "CVE-2025-58190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58190"
},
{
"name": "CVE-2025-37775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37775"
},
{
"name": "CVE-2025-38335",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38335"
},
{
"name": "CVE-2024-11168",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11168"
},
{
"name": "CVE-2025-38304",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38304"
},
{
"name": "CVE-2025-37892",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37892"
},
{
"name": "CVE-2025-38100",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38100"
},
{
"name": "CVE-2025-37859",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37859"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-1372",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1372"
},
{
"name": "CVE-2025-8851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8851"
},
{
"name": "CVE-2025-38043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38043"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-38471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38471"
},
{
"name": "CVE-2025-38520",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38520"
},
{
"name": "CVE-2025-37792",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37792"
},
{
"name": "CVE-2022-3626",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3626"
},
{
"name": "CVE-2024-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28834"
},
{
"name": "CVE-2021-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-38604"
},
{
"name": "CVE-2001-1268",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1268"
},
{
"name": "CVE-2024-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37891"
},
{
"name": "CVE-2025-38108",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38108"
},
{
"name": "CVE-2025-38230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38230"
},
{
"name": "CVE-2025-38229",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38229"
},
{
"name": "CVE-2023-46218",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-46218"
},
{
"name": "CVE-2025-40055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40055"
},
{
"name": "CVE-2025-38158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38158"
},
{
"name": "CVE-2025-37872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37872"
},
{
"name": "CVE-2025-9714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9714"
},
{
"name": "CVE-2025-38588",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38588"
},
{
"name": "CVE-2026-22801",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22801"
},
{
"name": "CVE-2025-39876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39876"
},
{
"name": "CVE-2025-40029",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40029"
},
{
"name": "CVE-2025-38279",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38279"
},
{
"name": "CVE-2025-38561",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38561"
},
{
"name": "CVE-2014-8141",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8141"
},
{
"name": "CVE-2025-38574",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38574"
},
{
"name": "CVE-2022-2255",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2255"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-25724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25724"
},
{
"name": "CVE-2025-27818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27818"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-40048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40048"
},
{
"name": "CVE-2025-5222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5222"
},
{
"name": "CVE-2025-38147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38147"
},
{
"name": "CVE-2023-6780",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6780"
},
{
"name": "CVE-2022-48468",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48468"
},
{
"name": "CVE-2025-23155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23155"
},
{
"name": "CVE-2025-38286",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38286"
},
{
"name": "CVE-2025-40219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40219"
},
{
"name": "CVE-2025-39757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39757"
},
{
"name": "CVE-2025-38501",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38501"
},
{
"name": "CVE-2025-38474",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38474"
},
{
"name": "CVE-2025-7545",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7545"
},
{
"name": "CVE-2025-37979",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37979"
},
{
"name": "CVE-2025-40043",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40043"
},
{
"name": "CVE-2024-3220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3220"
},
{
"name": "CVE-2022-3599",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3599"
},
{
"name": "CVE-2025-37777",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37777"
},
{
"name": "CVE-2021-39537",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-39537"
},
{
"name": "CVE-2025-39772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39772"
},
{
"name": "CVE-2025-37936",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37936"
},
{
"name": "CVE-2015-4787",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4787"
},
{
"name": "CVE-2022-27781",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27781"
},
{
"name": "CVE-2025-38601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38601"
},
{
"name": "CVE-2021-22925",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22925"
},
{
"name": "CVE-2025-37766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37766"
},
{
"name": "CVE-2022-47008",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47008"
},
{
"name": "CVE-2023-0796",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0796"
},
{
"name": "CVE-2025-38104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38104"
},
{
"name": "CVE-2025-37844",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37844"
},
{
"name": "CVE-2016-0682",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0682"
},
{
"name": "CVE-2025-21931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21931"
},
{
"name": "CVE-2025-37871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37871"
},
{
"name": "CVE-2025-37778",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37778"
},
{
"name": "CVE-2025-39716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39716"
},
{
"name": "CVE-2025-39702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39702"
},
{
"name": "CVE-2025-39973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39973"
},
{
"name": "CVE-2025-38515",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38515"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-38645",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38645"
},
{
"name": "CVE-2025-8941",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8941"
},
{
"name": "CVE-2023-52425",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52425"
},
{
"name": "CVE-2025-38163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38163"
},
{
"name": "CVE-2025-22126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22126"
},
{
"name": "CVE-2025-38444",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38444"
},
{
"name": "CVE-2025-38109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38109"
},
{
"name": "CVE-2023-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38546"
},
{
"name": "CVE-2025-39779",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39779"
},
{
"name": "CVE-2025-66866",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66866"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-37755",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37755"
},
{
"name": "CVE-2025-39685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39685"
},
{
"name": "CVE-2025-38660",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38660"
},
{
"name": "CVE-2025-39761",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39761"
},
{
"name": "CVE-2025-39943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39943"
},
{
"name": "CVE-2025-39945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39945"
},
{
"name": "CVE-2025-11840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11840"
},
{
"name": "CVE-2025-11731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11731"
},
{
"name": "CVE-2024-33602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33602"
},
{
"name": "CVE-2022-47629",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47629"
},
{
"name": "CVE-2025-39883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39883"
},
{
"name": "CVE-2025-39720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39720"
},
{
"name": "CVE-2025-38624",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38624"
},
{
"name": "CVE-2025-38388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38388"
},
{
"name": "CVE-2022-48554",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48554"
},
{
"name": "CVE-2022-0563",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0563"
},
{
"name": "CVE-2025-38157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38157"
},
{
"name": "CVE-2025-4056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4056"
},
{
"name": "CVE-2025-37790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37790"
},
{
"name": "CVE-2024-28757",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28757"
},
{
"name": "CVE-2020-29562",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-29562"
},
{
"name": "CVE-2025-38417",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38417"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-39746",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39746"
},
{
"name": "CVE-2015-4776",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4776"
},
{
"name": "CVE-2025-38323",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38323"
},
{
"name": "CVE-2025-40019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40019"
},
{
"name": "CVE-2017-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3616"
},
{
"name": "CVE-2025-38208",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38208"
},
{
"name": "CVE-2025-27817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27817"
},
{
"name": "CVE-2023-30086",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30086"
},
{
"name": "CVE-2025-40240",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40240"
},
{
"name": "CVE-2025-38219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38219"
},
{
"name": "CVE-2025-39889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39889"
},
{
"name": "CVE-2015-4785",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4785"
},
{
"name": "CVE-2025-38099",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38099"
},
{
"name": "CVE-2025-38524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38524"
},
{
"name": "CVE-2025-38466",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38466"
},
{
"name": "CVE-2025-37758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37758"
},
{
"name": "CVE-2022-32208",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32208"
},
{
"name": "CVE-2025-40081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40081"
},
{
"name": "CVE-2025-38087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38087"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2025-1181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1181"
},
{
"name": "CVE-2022-41409",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-41409"
},
{
"name": "CVE-2023-25586",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25586"
},
{
"name": "CVE-2024-12797",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12797"
},
{
"name": "CVE-2024-58011",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58011"
},
{
"name": "CVE-2025-12084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12084"
},
{
"name": "CVE-2025-38039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38039"
},
{
"name": "CVE-2017-20052",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-20052"
},
{
"name": "CVE-2025-40026",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40026"
},
{
"name": "CVE-2025-40153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40153"
},
{
"name": "CVE-2025-0840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0840"
},
{
"name": "CVE-2022-2057",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2057"
},
{
"name": "CVE-2023-45853",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45853"
},
{
"name": "CVE-2025-38595",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38595"
},
{
"name": "CVE-2024-47611",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47611"
},
{
"name": "CVE-2025-38626",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38626"
},
{
"name": "CVE-2025-40121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40121"
},
{
"name": "CVE-2025-45582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45582"
},
{
"name": "CVE-2025-11468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11468"
},
{
"name": "CVE-2025-40204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40204"
},
{
"name": "CVE-2025-37852",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37852"
},
{
"name": "CVE-2025-37841",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37841"
},
{
"name": "CVE-2025-40171",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40171"
},
{
"name": "CVE-2025-37918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37918"
},
{
"name": "CVE-2025-37917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37917"
},
{
"name": "CVE-2025-38290",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38290"
},
{
"name": "CVE-2021-22901",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22901"
},
{
"name": "CVE-2025-38063",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38063"
},
{
"name": "CVE-2021-3998",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3998"
},
{
"name": "CVE-2025-1179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1179"
},
{
"name": "CVE-2025-37770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37770"
},
{
"name": "CVE-2025-37773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37773"
},
{
"name": "CVE-2023-26965",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26965"
},
{
"name": "CVE-2023-2602",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2602"
},
{
"name": "CVE-2025-6069",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6069"
},
{
"name": "CVE-2017-10140",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10140"
},
{
"name": "CVE-2024-6232",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6232"
},
{
"name": "CVE-2025-38578",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38578"
},
{
"name": "CVE-2025-38675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38675"
},
{
"name": "CVE-2025-39911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39911"
},
{
"name": "CVE-2025-69419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69419"
},
{
"name": "CVE-2025-6052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6052"
},
{
"name": "CVE-2025-38646",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38646"
},
{
"name": "CVE-2025-38491",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38491"
},
{
"name": "CVE-2025-38708",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38708"
},
{
"name": "CVE-2025-37961",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37961"
},
{
"name": "CVE-2025-40125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40125"
},
{
"name": "CVE-2023-52426",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52426"
},
{
"name": "CVE-2025-38313",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38313"
},
{
"name": "CVE-2025-38336",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38336"
},
{
"name": "CVE-2025-40349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40349"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-38408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38408"
},
{
"name": "CVE-2022-2058",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2058"
},
{
"name": "CVE-2025-38644",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38644"
},
{
"name": "CVE-2025-38692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38692"
},
{
"name": "CVE-2025-38061",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38061"
},
{
"name": "CVE-2024-45492",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45492"
},
{
"name": "CVE-2025-37983",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37983"
},
{
"name": "CVE-2015-4764",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4764"
},
{
"name": "CVE-2025-38127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38127"
},
{
"name": "CVE-2026-22715",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22715"
},
{
"name": "CVE-2020-1752",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1752"
},
{
"name": "CVE-2025-38375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38375"
},
{
"name": "CVE-2025-37784",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37784"
},
{
"name": "CVE-2025-39701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39701"
},
{
"name": "CVE-2015-4779",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4779"
},
{
"name": "CVE-2025-4330",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4330"
},
{
"name": "CVE-2025-40187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40187"
},
{
"name": "CVE-2025-37920",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37920"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-37815",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37815"
},
{
"name": "CVE-2025-38686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38686"
},
{
"name": "CVE-2025-37819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37819"
},
{
"name": "CVE-2025-49794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49794"
},
{
"name": "CVE-2024-57970",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57970"
},
{
"name": "CVE-2025-39913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39913"
},
{
"name": "CVE-2024-9287",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9287"
},
{
"name": "CVE-2022-32207",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32207"
},
{
"name": "CVE-2025-40092",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40092"
},
{
"name": "CVE-2022-47007",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47007"
},
{
"name": "CVE-2025-4138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4138"
},
{
"name": "CVE-2025-61731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61731"
},
{
"name": "CVE-2022-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3627"
},
{
"name": "CVE-2025-38609",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38609"
},
{
"name": "CVE-2025-39967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39967"
},
{
"name": "CVE-2023-36632",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36632"
},
{
"name": "CVE-2025-38463",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38463"
},
{
"name": "CVE-2025-40115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40115"
},
{
"name": "CVE-2023-25433",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25433"
},
{
"name": "CVE-2025-38112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38112"
},
{
"name": "CVE-2025-66863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66863"
},
{
"name": "CVE-2015-4780",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4780"
},
{
"name": "CVE-2025-38521",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38521"
},
{
"name": "CVE-2025-38023",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38023"
},
{
"name": "CVE-2025-39709",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39709"
},
{
"name": "CVE-2025-38282",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38282"
},
{
"name": "CVE-2024-56171",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56171"
},
{
"name": "CVE-2025-39689",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39689"
},
{
"name": "CVE-2025-38215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38215"
},
{
"name": "CVE-2022-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3598"
},
{
"name": "CVE-2023-0798",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0798"
},
{
"name": "CVE-2025-39787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39787"
},
{
"name": "CVE-2025-37943",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37943"
},
{
"name": "CVE-2025-37745",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37745"
},
{
"name": "CVE-2025-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8176"
},
{
"name": "CVE-2025-13837",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13837"
},
{
"name": "CVE-2025-39731",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39731"
},
{
"name": "CVE-2025-38734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38734"
},
{
"name": "CVE-2025-38653",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38653"
},
{
"name": "CVE-2025-38571",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38571"
},
{
"name": "CVE-2025-37789",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37789"
},
{
"name": "CVE-2025-24970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24970"
},
{
"name": "CVE-2022-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38476"
},
{
"name": "CVE-2021-45078",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-45078"
},
{
"name": "CVE-2025-38695",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38695"
},
{
"name": "CVE-2022-3515",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3515"
},
{
"name": "CVE-2025-38004",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38004"
},
{
"name": "CVE-2025-39749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39749"
},
{
"name": "CVE-2025-39949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39949"
},
{
"name": "CVE-2015-7696",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7696"
},
{
"name": "CVE-2022-4285",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4285"
},
{
"name": "CVE-2025-38387",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38387"
},
{
"name": "CVE-2015-4754",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4754"
},
{
"name": "CVE-2025-38362",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38362"
},
{
"name": "CVE-2022-27776",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27776"
},
{
"name": "CVE-2023-45322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45322"
},
{
"name": "CVE-2025-40173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40173"
},
{
"name": "CVE-2025-37924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37924"
},
{
"name": "CVE-2026-22716",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22716"
},
{
"name": "CVE-2024-8176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8176"
},
{
"name": "CVE-2025-38371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38371"
},
{
"name": "CVE-2023-2731",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2731"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-56538",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56538"
},
{
"name": "CVE-2025-39923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39923"
},
{
"name": "CVE-2021-35939",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35939"
},
{
"name": "CVE-2025-38445",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38445"
},
{
"name": "CVE-2025-38456",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38456"
},
{
"name": "CVE-2025-38538",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38538"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2023-0803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0803"
},
{
"name": "CVE-2025-37867",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37867"
},
{
"name": "CVE-2025-23160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23160"
},
{
"name": "CVE-2025-6176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6176"
},
{
"name": "CVE-2022-47695",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47695"
},
{
"name": "CVE-2025-38295",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38295"
},
{
"name": "CVE-2025-15367",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15367"
},
{
"name": "CVE-2025-38461",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38461"
},
{
"name": "CVE-2025-37857",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37857"
},
{
"name": "CVE-2023-30774",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30774"
},
{
"name": "CVE-2024-13176",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13176"
},
{
"name": "CVE-2025-37842",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37842"
},
{
"name": "CVE-2025-39953",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39953"
},
{
"name": "CVE-2022-50458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50458"
},
{
"name": "CVE-2025-15467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15467"
},
{
"name": "CVE-2024-58251",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-58251"
},
{
"name": "CVE-2025-38710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38710"
},
{
"name": "CVE-2026-2006",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2006"
},
{
"name": "CVE-2023-28322",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28322"
},
{
"name": "CVE-2025-39681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39681"
},
{
"name": "CVE-2025-1180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1180"
},
{
"name": "CVE-2025-38060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38060"
},
{
"name": "CVE-2025-40167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40167"
},
{
"name": "CVE-2025-38159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38159"
},
{
"name": "CVE-2021-3421",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3421"
},
{
"name": "CVE-2025-38066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38066"
},
{
"name": "CVE-2025-4373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4373"
},
{
"name": "CVE-2025-39770",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39770"
},
{
"name": "CVE-2015-4790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4790"
},
{
"name": "CVE-2026-0994",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0994"
},
{
"name": "CVE-2025-39969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39969"
},
{
"name": "CVE-2025-37744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37744"
},
{
"name": "CVE-2025-4598",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4598"
},
{
"name": "CVE-2025-38705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38705"
},
{
"name": "CVE-2025-40194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40194"
},
{
"name": "CVE-2025-38706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38706"
},
{
"name": "CVE-2025-38305",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38305"
},
{
"name": "CVE-2025-37884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37884"
},
{
"name": "CVE-2025-38067",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38067"
},
{
"name": "CVE-2025-39750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39750"
},
{
"name": "CVE-2025-38699",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38699"
},
{
"name": "CVE-2025-37927",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37927"
},
{
"name": "CVE-2025-38707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38707"
},
{
"name": "CVE-2025-38562",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38562"
},
{
"name": "CVE-2025-37897",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37897"
},
{
"name": "CVE-2016-9840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9840"
},
{
"name": "CVE-2025-37911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37911"
},
{
"name": "CVE-2025-40245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40245"
},
{
"name": "CVE-2025-38587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38587"
},
{
"name": "CVE-2023-6779",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6779"
},
{
"name": "CVE-2025-37869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37869"
},
{
"name": "CVE-2025-39692",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39692"
},
{
"name": "CVE-2025-5115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5115"
},
{
"name": "CVE-2023-53107",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53107"
},
{
"name": "CVE-2024-13009",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13009"
},
{
"name": "CVE-2022-49043",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49043"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2021-46195",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46195"
},
{
"name": "CVE-2015-2624",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2624"
},
{
"name": "CVE-2023-29491",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29491"
},
{
"name": "CVE-2025-38068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38068"
},
{
"name": "CVE-2025-38436",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38436"
},
{
"name": "CVE-2025-37930",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37930"
},
{
"name": "CVE-2025-38401",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38401"
},
{
"name": "CVE-2025-38677",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38677"
},
{
"name": "CVE-2025-38097",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38097"
},
{
"name": "CVE-2021-20266",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20266"
},
{
"name": "CVE-2025-1182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1182"
},
{
"name": "CVE-2025-37810",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37810"
},
{
"name": "CVE-2025-38253",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38253"
},
{
"name": "CVE-2025-38123",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38123"
},
{
"name": "CVE-2025-38338",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38338"
},
{
"name": "CVE-2025-38555",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38555"
},
{
"name": "CVE-2025-38239",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38239"
},
{
"name": "CVE-2025-1371",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1371"
},
{
"name": "CVE-2025-40001",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40001"
},
{
"name": "CVE-2022-40897",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40897"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2025-0938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0938"
},
{
"name": "CVE-2022-27782",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27782"
},
{
"name": "CVE-2008-0888",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-0888"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2025-38590",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38590"
},
{
"name": "CVE-2025-38027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38027"
},
{
"name": "CVE-2025-38102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38102"
},
{
"name": "CVE-2024-33600",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33600"
},
{
"name": "CVE-2015-2654",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2654"
},
{
"name": "CVE-2022-1210",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1210"
},
{
"name": "CVE-2025-40035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40035"
},
{
"name": "CVE-2025-38283",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38283"
},
{
"name": "CVE-2023-25584",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25584"
},
{
"name": "CVE-2025-23159",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23159"
},
{
"name": "CVE-2025-39988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39988"
},
{
"name": "CVE-2026-2005",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2005"
},
{
"name": "CVE-2025-38455",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38455"
},
{
"name": "CVE-2015-4778",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4778"
},
{
"name": "CVE-2025-1152",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1152"
},
{
"name": "CVE-2025-38584",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38584"
},
{
"name": "CVE-2025-38015",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38015"
},
{
"name": "CVE-2025-39675",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39675"
},
{
"name": "CVE-2025-39679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39679"
},
{
"name": "CVE-2025-11082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11082"
},
{
"name": "CVE-2025-38527",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38527"
},
{
"name": "CVE-2025-38449",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38449"
},
{
"name": "CVE-2025-40233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40233"
},
{
"name": "CVE-2023-32636",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32636"
},
{
"name": "CVE-2025-37853",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37853"
},
{
"name": "CVE-2023-6277",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6277"
},
{
"name": "CVE-2025-38126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38126"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-38149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38149"
},
{
"name": "CVE-2025-39763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39763"
},
{
"name": "CVE-2025-38399",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38399"
},
{
"name": "CVE-2025-40020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40020"
},
{
"name": "CVE-2025-38065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38065"
},
{
"name": "CVE-2025-38693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38693"
},
{
"name": "CVE-2025-38679",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38679"
},
{
"name": "CVE-2025-38459",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38459"
},
{
"name": "CVE-2025-40188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40188"
},
{
"name": "CVE-2025-38685",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38685"
},
{
"name": "CVE-2023-3618",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3618"
},
{
"name": "CVE-2025-38412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38412"
},
{
"name": "CVE-2025-38031",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38031"
},
{
"name": "CVE-2023-4813",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4813"
},
{
"name": "CVE-2017-3617",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3617"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-38293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38293"
},
{
"name": "CVE-2025-58057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58057"
},
{
"name": "CVE-2025-1149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1149"
},
{
"name": "CVE-2025-38648",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38648"
},
{
"name": "CVE-2025-38278",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38278"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-37764",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37764"
},
{
"name": "CVE-2025-38184",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38184"
},
{
"name": "CVE-2017-3615",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3615"
},
{
"name": "CVE-2022-44840",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-44840"
},
{
"name": "CVE-2023-28320",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28320"
},
{
"name": "CVE-2025-37741",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37741"
},
{
"name": "CVE-2026-22795",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22795"
},
{
"name": "CVE-2025-38053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38053"
},
{
"name": "CVE-2025-27587",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27587"
},
{
"name": "CVE-2026-0988",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0988"
},
{
"name": "CVE-2025-8534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8534"
},
{
"name": "CVE-2025-37822",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37822"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-37912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37912"
},
{
"name": "CVE-2025-38482",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38482"
},
{
"name": "CVE-2023-39810",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39810"
},
{
"name": "CVE-2025-37820",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37820"
},
{
"name": "CVE-2025-37985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37985"
},
{
"name": "CVE-2025-1390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1390"
},
{
"name": "CVE-2024-33599",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33599"
},
{
"name": "CVE-2024-0743",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-0743"
},
{
"name": "CVE-2025-38634",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38634"
},
{
"name": "CVE-2025-37787",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37787"
},
{
"name": "CVE-2026-21925",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21925"
},
{
"name": "CVE-2025-38008",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38008"
},
{
"name": "CVE-2025-38458",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38458"
},
{
"name": "CVE-2025-39730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39730"
},
{
"name": "CVE-2025-38011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38011"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2022-50444",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50444"
},
{
"name": "CVE-2025-38034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38034"
},
{
"name": "CVE-2017-3608",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3608"
},
{
"name": "CVE-2025-38135",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38135"
},
{
"name": "CVE-2023-28484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28484"
},
{
"name": "CVE-2025-38619",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38619"
},
{
"name": "CVE-2019-2708",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-2708"
},
{
"name": "CVE-2025-38312",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38312"
},
{
"name": "CVE-2025-38095",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38095"
},
{
"name": "CVE-2016-0692",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0692"
},
{
"name": "CVE-2025-37878",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37878"
},
{
"name": "CVE-2025-39737",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39737"
},
{
"name": "CVE-2025-38464",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38464"
},
{
"name": "CVE-2021-46174",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46174"
},
{
"name": "CVE-2026-0861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0861"
},
{
"name": "CVE-2025-40049",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40049"
},
{
"name": "CVE-2023-0802",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0802"
},
{
"name": "CVE-2023-53164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53164"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2021-22924",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22924"
},
{
"name": "CVE-2023-47038",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47038"
},
{
"name": "CVE-2025-38363",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38363"
},
{
"name": "CVE-2025-38702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38702"
},
{
"name": "CVE-2025-38319",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38319"
},
{
"name": "CVE-2020-10878",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10878"
},
{
"name": "CVE-2022-0529",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0529"
},
{
"name": "CVE-2015-4782",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4782"
},
{
"name": "CVE-2025-38724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38724"
},
{
"name": "CVE-2022-2056",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2056"
},
{
"name": "CVE-2023-26966",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-26966"
},
{
"name": "CVE-2025-40070",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40070"
},
{
"name": "CVE-2025-38250",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38250"
},
{
"name": "CVE-2025-38457",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38457"
},
{
"name": "CVE-2025-38582",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38582"
},
{
"name": "CVE-2025-37813",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37813"
},
{
"name": "CVE-2025-38543",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38543"
},
{
"name": "CVE-2025-38698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38698"
},
{
"name": "CVE-2025-38212",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38212"
},
{
"name": "CVE-2025-40106",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40106"
},
{
"name": "CVE-2017-3610",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3610"
},
{
"name": "CVE-2025-38298",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38298"
},
{
"name": "CVE-2022-43552",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43552"
},
{
"name": "CVE-2025-5915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5915"
},
{
"name": "CVE-2025-39739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39739"
},
{
"name": "CVE-2022-48065",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48065"
},
{
"name": "CVE-2025-38024",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38024"
},
{
"name": "CVE-2025-38496",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38496"
},
{
"name": "CVE-2022-49063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49063"
},
{
"name": "CVE-2025-5917",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5917"
},
{
"name": "CVE-2025-38078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38078"
},
{
"name": "CVE-2022-47696",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47696"
},
{
"name": "CVE-2025-38419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38419"
},
{
"name": "CVE-2024-45490",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45490"
},
{
"name": "CVE-2024-51744",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-51744"
},
{
"name": "CVE-2025-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38533"
},
{
"name": "CVE-2021-22947",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22947"
},
{
"name": "CVE-2025-40205",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40205"
},
{
"name": "CVE-2015-4788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4788"
},
{
"name": "CVE-2025-38169",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38169"
},
{
"name": "CVE-2025-37931",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37931"
},
{
"name": "CVE-2025-38511",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38511"
},
{
"name": "CVE-2025-38537",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38537"
},
{
"name": "CVE-2025-38546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38546"
},
{
"name": "CVE-2025-38211",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38211"
},
{
"name": "CVE-2025-6965",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6965"
},
{
"name": "CVE-2023-28319",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28319"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2021-22922",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22922"
},
{
"name": "CVE-2025-38057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38057"
},
{
"name": "CVE-2024-45491",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45491"
},
{
"name": "CVE-2025-50182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50182"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2020-2981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2981"
},
{
"name": "CVE-2025-37887",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37887"
},
{
"name": "CVE-2025-38077",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38077"
},
{
"name": "CVE-2025-38251",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38251"
},
{
"name": "CVE-2022-22576",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-22576"
},
{
"name": "CVE-2025-37861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37861"
},
{
"name": "CVE-2025-38120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38120"
},
{
"name": "CVE-2025-38285",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38285"
},
{
"name": "CVE-2025-39743",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39743"
},
{
"name": "CVE-2025-39718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39718"
},
{
"name": "CVE-2025-37938",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37938"
},
{
"name": "CVE-2025-38005",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38005"
},
{
"name": "CVE-2025-38368",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38368"
},
{
"name": "CVE-2025-59375",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59375"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2022-35205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35205"
},
{
"name": "CVE-2025-8194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8194"
},
{
"name": "CVE-2025-38161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38161"
},
{
"name": "CVE-2025-38331",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38331"
},
{
"name": "CVE-2025-38354",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38354"
},
{
"name": "CVE-2016-3418",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3418"
},
{
"name": "CVE-2025-38712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38712"
},
{
"name": "CVE-2025-38732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38732"
},
{
"name": "CVE-2022-29824",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29824"
},
{
"name": "CVE-2025-39773",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39773"
},
{
"name": "CVE-2024-11053",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-11053"
},
{
"name": "CVE-2025-38696",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38696"
},
{
"name": "CVE-2024-7264",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-7264"
},
{
"name": "CVE-2025-38274",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38274"
},
{
"name": "CVE-2025-40027",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40027"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-39885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39885"
},
{
"name": "CVE-2021-4214",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4214"
},
{
"name": "CVE-2025-50181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-50181"
},
{
"name": "CVE-2015-2656",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2656"
},
{
"name": "CVE-2025-37874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37874"
},
{
"name": "CVE-2025-38115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38115"
},
{
"name": "CVE-2025-66382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66382"
},
{
"name": "CVE-2025-38632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38632"
},
{
"name": "CVE-2021-22946",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22946"
},
{
"name": "CVE-2023-0767",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0767"
},
{
"name": "CVE-2025-37988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37988"
},
{
"name": "CVE-2025-1795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1795"
},
{
"name": "CVE-2025-23158",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23158"
},
{
"name": "CVE-2017-3612",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3612"
},
{
"name": "CVE-2025-23144",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23144"
},
{
"name": "CVE-2025-38153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38153"
},
{
"name": "CVE-2025-37969",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37969"
},
{
"name": "CVE-2025-69421",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69421"
},
{
"name": "CVE-2025-38548",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38548"
},
{
"name": "CVE-2025-37816",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37816"
},
{
"name": "CVE-2025-37742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37742"
},
{
"name": "CVE-2025-4517",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4517"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-37765",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37765"
},
{
"name": "CVE-2016-9843",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9843"
},
{
"name": "CVE-2025-1178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1178"
},
{
"name": "CVE-2025-38395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38395"
},
{
"name": "CVE-2025-37921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37921"
},
{
"name": "CVE-2023-29499",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29499"
},
{
"name": "CVE-2025-38507",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38507"
},
{
"name": "CVE-2025-39989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39989"
},
{
"name": "CVE-2025-38337",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38337"
},
{
"name": "CVE-2025-38014",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38014"
},
{
"name": "CVE-2025-38258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38258"
},
{
"name": "CVE-2024-1013",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-1013"
},
{
"name": "CVE-2025-37828",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37828"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2025-30258",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30258"
},
{
"name": "CVE-2025-1176",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1176"
},
{
"name": "CVE-2025-37769",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37769"
},
{
"name": "CVE-2025-38465",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38465"
},
{
"name": "CVE-2024-56406",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56406"
},
{
"name": "CVE-2025-38513",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38513"
},
{
"name": "CVE-2025-39970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39970"
},
{
"name": "CVE-2025-38086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38086"
},
{
"name": "CVE-2025-37935",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37935"
},
{
"name": "CVE-2025-38396",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38396"
},
{
"name": "CVE-2025-23161",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23161"
},
{
"name": "CVE-2025-38407",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38407"
},
{
"name": "CVE-2025-39994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39994"
},
{
"name": "CVE-2015-4784",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4784"
},
{
"name": "CVE-2025-12119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12119"
},
{
"name": "CVE-2023-4527",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4527"
},
{
"name": "CVE-2025-38493",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38493"
},
{
"name": "CVE-2025-37803",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37803"
},
{
"name": "CVE-2025-38670",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38670"
},
{
"name": "CVE-2025-39732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39732"
},
{
"name": "CVE-2024-56433",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-56433"
},
{
"name": "CVE-2025-37824",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37824"
},
{
"name": "CVE-2023-34410",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34410"
},
{
"name": "CVE-2025-38602",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38602"
},
{
"name": "CVE-2023-4156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4156"
},
{
"name": "CVE-2014-8139",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8139"
},
{
"name": "CVE-2025-47911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47911"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-38003",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38003"
},
{
"name": "CVE-2025-38441",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38441"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-38007",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38007"
},
{
"name": "CVE-2025-37923",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37923"
},
{
"name": "CVE-2025-40088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40088"
},
{
"name": "CVE-2025-40220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40220"
},
{
"name": "CVE-2022-2519",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2519"
},
{
"name": "CVE-2025-38142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38142"
},
{
"name": "CVE-2022-23990",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23990"
},
{
"name": "CVE-2022-49920",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49920"
},
{
"name": "CVE-2025-37739",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37739"
},
{
"name": "CVE-2022-0530",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-0530"
},
{
"name": "CVE-2025-13151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13151"
},
{
"name": "CVE-2025-38478",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38478"
},
{
"name": "CVE-2025-38568",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38568"
},
{
"name": "CVE-2025-38583",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38583"
},
{
"name": "CVE-2025-39788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39788"
},
{
"name": "CVE-2025-22058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22058"
},
{
"name": "CVE-2025-37831",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37831"
},
{
"name": "CVE-2025-38499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38499"
},
{
"name": "CVE-2025-4435",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4435"
},
{
"name": "CVE-2025-38269",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38269"
},
{
"name": "CVE-2025-38079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38079"
},
{
"name": "CVE-2025-37940",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37940"
},
{
"name": "CVE-2022-28391",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28391"
},
{
"name": "CVE-2021-46828",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46828"
},
{
"name": "CVE-2023-2804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2804"
},
{
"name": "CVE-2025-37945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37945"
},
{
"name": "CVE-2025-6141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6141"
},
{
"name": "CVE-2025-40109",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40109"
},
{
"name": "CVE-2024-13978",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-13978"
},
{
"name": "CVE-2025-38735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38735"
},
{
"name": "CVE-2022-50247",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50247"
},
{
"name": "CVE-2025-40006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40006"
},
{
"name": "CVE-2025-12383",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12383"
},
{
"name": "CVE-2025-38652",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38652"
},
{
"name": "CVE-2025-38110",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38110"
},
{
"name": "CVE-2025-38422",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38422"
},
{
"name": "CVE-2025-38402",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38402"
},
{
"name": "CVE-2021-3520",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3520"
},
{
"name": "CVE-2025-39698",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39698"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-37915",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37915"
},
{
"name": "CVE-2025-6020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6020"
},
{
"name": "CVE-2015-2626",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2626"
},
{
"name": "CVE-2025-23146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23146"
},
{
"name": "CVE-2022-48064",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48064"
},
{
"name": "CVE-2025-37903",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37903"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-23142",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23142"
},
{
"name": "CVE-2020-10029",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10029"
},
{
"name": "CVE-2025-7425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7425"
},
{
"name": "CVE-2022-36227",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-36227"
},
{
"name": "CVE-2025-37738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37738"
},
{
"name": "CVE-2025-40011",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40011"
},
{
"name": "CVE-2025-21883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21883"
},
{
"name": "CVE-2025-38303",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38303"
},
{
"name": "CVE-2023-29469",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29469"
},
{
"name": "CVE-2024-5535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5535"
},
{
"name": "CVE-2025-38074",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38074"
},
{
"name": "CVE-2023-52355",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-52355"
},
{
"name": "CVE-2025-40085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40085"
},
{
"name": "CVE-2025-38119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38119"
},
{
"name": "CVE-2025-38232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38232"
},
{
"name": "CVE-2025-38245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38245"
},
{
"name": "CVE-2025-40231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40231"
},
{
"name": "CVE-2021-36770",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36770"
},
{
"name": "CVE-2025-38324",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38324"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2021-36976",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-36976"
},
{
"name": "CVE-2025-38018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38018"
},
{
"name": "CVE-2023-3164",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3164"
},
{
"name": "CVE-2022-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3597"
},
{
"name": "CVE-2023-27535",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27535"
},
{
"name": "CVE-2022-27775",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27775"
},
{
"name": "CVE-2024-12718",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12718"
},
{
"name": "CVE-2025-37830",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37830"
},
{
"name": "CVE-2018-25032",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-25032"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-38614",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38614"
},
{
"name": "CVE-2025-37991",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37991"
},
{
"name": "CVE-2026-22796",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22796"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-38425",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38425"
},
{
"name": "CVE-2022-3970",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3970"
},
{
"name": "CVE-2025-9165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9165"
},
{
"name": "CVE-2023-30571",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30571"
},
{
"name": "CVE-2022-50249",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50249"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-37978",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37978"
},
{
"name": "CVE-2025-37781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37781"
},
{
"name": "CVE-2024-5642",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-5642"
},
{
"name": "CVE-2024-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3219"
},
{
"name": "CVE-2015-4781",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4781"
},
{
"name": "CVE-2025-38210",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38210"
},
{
"name": "CVE-2025-38542",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38542"
},
{
"name": "CVE-2025-38664",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38664"
},
{
"name": "CVE-2025-38344",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38344"
},
{
"name": "CVE-2025-23145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23145"
},
{
"name": "CVE-2025-23143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23143"
},
{
"name": "CVE-2021-3999",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3999"
},
{
"name": "CVE-2023-53182",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-53182"
},
{
"name": "CVE-2025-38322",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38322"
},
{
"name": "CVE-2025-38088",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38088"
},
{
"name": "CVE-2025-23141",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23141"
},
{
"name": "CVE-2025-37823",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37823"
},
{
"name": "CVE-2022-27774",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-27774"
},
{
"name": "CVE-2025-38332",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38332"
},
{
"name": "CVE-2025-38386",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38386"
},
{
"name": "CVE-2025-61732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61732"
},
{
"name": "CVE-2017-3605",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3605"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-38385",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38385"
},
{
"name": "CVE-2022-40303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40303"
},
{
"name": "CVE-2025-11083",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11083"
},
{
"name": "CVE-2025-37952",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37952"
},
{
"name": "CVE-2023-45803",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45803"
},
{
"name": "CVE-2024-6763",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6763"
},
{
"name": "CVE-2023-0801",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0801"
},
{
"name": "CVE-2025-38694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38694"
},
{
"name": "CVE-2025-37793",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37793"
},
{
"name": "CVE-2020-10543",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10543"
},
{
"name": "CVE-2025-1377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1377"
},
{
"name": "CVE-2025-37740",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37740"
},
{
"name": "CVE-2025-38676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38676"
},
{
"name": "CVE-2025-38530",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38530"
},
{
"name": "CVE-2022-4645",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-4645"
},
{
"name": "CVE-2025-38174",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38174"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-37826",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37826"
},
{
"name": "CVE-2025-37986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37986"
},
{
"name": "CVE-2025-37829",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37829"
},
{
"name": "CVE-2025-46394",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-46394"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2025-38409",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38409"
},
{
"name": "CVE-2025-6170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6170"
},
{
"name": "CVE-2022-3479",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3479"
},
{
"name": "CVE-2021-35937",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35937"
},
{
"name": "CVE-2025-9900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9900"
},
{
"name": "CVE-2025-40183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40183"
},
{
"name": "CVE-2025-38019",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38019"
},
{
"name": "CVE-2025-38729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38729"
},
{
"name": "CVE-2025-14017",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14017"
},
{
"name": "CVE-2023-40745",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40745"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2025-23151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23151"
},
{
"name": "CVE-2025-38037",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38037"
},
{
"name": "CVE-2017-3609",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3609"
},
{
"name": "CVE-2025-39998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39998"
},
{
"name": "CVE-2014-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9636"
},
{
"name": "CVE-2025-13836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13836"
},
{
"name": "CVE-2017-3611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3611"
},
{
"name": "CVE-2022-2521",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2521"
},
{
"name": "CVE-2023-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-28321"
},
{
"name": "CVE-2025-37796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37796"
},
{
"name": "CVE-2025-37962",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37962"
},
{
"name": "CVE-2026-1002",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1002"
},
{
"name": "CVE-2025-40134",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40134"
},
{
"name": "CVE-2025-38681",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38681"
},
{
"name": "CVE-2023-25435",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25435"
},
{
"name": "CVE-2025-37799",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37799"
},
{
"name": "CVE-2022-29155",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29155"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-38593",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38593"
},
{
"name": "CVE-2026-25210",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25210"
},
{
"name": "CVE-2022-2309",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2309"
},
{
"name": "CVE-2025-39968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39968"
},
{
"name": "CVE-2023-33285",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-33285"
},
{
"name": "CVE-2024-52533",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-52533"
},
{
"name": "CVE-2025-38342",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38342"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-39795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39795"
},
{
"name": "CVE-2015-4777",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4777"
},
{
"name": "CVE-2025-37801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37801"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-38167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38167"
},
{
"name": "CVE-2025-37883",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37883"
},
{
"name": "CVE-2025-37863",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37863"
},
{
"name": "CVE-2023-0687",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0687"
},
{
"name": "CVE-2025-37901",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37901"
},
{
"name": "CVE-2025-38687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38687"
},
{
"name": "CVE-2022-32221",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32221"
},
{
"name": "CVE-2025-37811",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37811"
},
{
"name": "CVE-2022-37434",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-37434"
},
{
"name": "CVE-2025-38257",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38257"
},
{
"name": "CVE-2022-29458",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29458"
},
{
"name": "CVE-2023-5156",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5156"
},
{
"name": "CVE-2025-22104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22104"
},
{
"name": "CVE-2025-37864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37864"
},
{
"name": "CVE-2021-32256",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32256"
},
{
"name": "CVE-2025-38307",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38307"
},
{
"name": "CVE-2025-11081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11081"
},
{
"name": "CVE-2025-55163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55163"
},
{
"name": "CVE-2025-37916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37916"
},
{
"name": "CVE-2025-38111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38111"
},
{
"name": "CVE-2025-39986",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39986"
},
{
"name": "CVE-2026-22184",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22184"
},
{
"name": "CVE-2025-37767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37767"
},
{
"name": "CVE-2025-5918",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5918"
},
{
"name": "CVE-2025-39955",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39955"
},
{
"name": "CVE-2025-66293",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66293"
},
{
"name": "CVE-2017-3614",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3614"
},
{
"name": "CVE-2025-37989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37989"
},
{
"name": "CVE-2025-38529",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38529"
},
{
"name": "CVE-2025-38326",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38326"
},
{
"name": "CVE-2025-38055",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38055"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-38129",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38129"
},
{
"name": "CVE-2025-32990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32990"
},
{
"name": "CVE-2025-38384",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38384"
},
{
"name": "CVE-2025-38334",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38334"
},
{
"name": "CVE-2025-38728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38728"
},
{
"name": "CVE-2025-38424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38424"
},
{
"name": "CVE-2025-38430",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38430"
},
{
"name": "CVE-2025-38715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38715"
},
{
"name": "CVE-2021-22897",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22897"
},
{
"name": "CVE-2025-39734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39734"
},
{
"name": "CVE-2025-38089",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38089"
},
{
"name": "CVE-2025-40078",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40078"
},
{
"name": "CVE-2025-38382",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38382"
},
{
"name": "CVE-2025-15366",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15366"
},
{
"name": "CVE-2023-2603",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2603"
},
{
"name": "CVE-2025-38608",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38608"
},
{
"name": "CVE-2025-38650",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38650"
},
{
"name": "CVE-2025-4802",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4802"
},
{
"name": "CVE-2025-39710",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39710"
},
{
"name": "CVE-2025-40116",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40116"
},
{
"name": "CVE-2025-68249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68249"
},
{
"name": "CVE-2026-0990",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0990"
},
{
"name": "CVE-2025-38124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38124"
},
{
"name": "CVE-2025-39934",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39934"
},
{
"name": "CVE-2025-37925",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37925"
},
{
"name": "CVE-2026-0865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0865"
},
{
"name": "CVE-2024-9143",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-9143"
},
{
"name": "CVE-2023-0799",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0799"
},
{
"name": "CVE-2020-12723",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12723"
},
{
"name": "CVE-2025-39683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39683"
},
{
"name": "CVE-2025-38420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38420"
},
{
"name": "CVE-2025-38071",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38071"
},
{
"name": "CVE-2021-3521",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3521"
},
{
"name": "CVE-2025-40179",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40179"
},
{
"name": "CVE-2025-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37972"
},
{
"name": "CVE-2025-38183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38183"
},
{
"name": "CVE-2025-40127",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40127"
},
{
"name": "CVE-2025-37768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37768"
},
{
"name": "CVE-2025-39794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39794"
},
{
"name": "CVE-2025-38160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38160"
},
{
"name": "CVE-2024-33601",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-33601"
},
{
"name": "CVE-2025-32989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32989"
},
{
"name": "CVE-2022-48063",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48063"
},
{
"name": "CVE-2024-53589",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53589"
},
{
"name": "CVE-2025-37984",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37984"
},
{
"name": "CVE-2025-38528",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38528"
},
{
"name": "CVE-2025-39996",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39996"
},
{
"name": "CVE-2025-37856",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37856"
},
{
"name": "CVE-2025-38107",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38107"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2023-32181",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32181"
},
{
"name": "CVE-2025-38292",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38292"
},
{
"name": "CVE-2025-40053",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40053"
},
{
"name": "CVE-2025-38085",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38085"
},
{
"name": "CVE-2026-24515",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24515"
},
{
"name": "CVE-2025-38222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38222"
},
{
"name": "CVE-2025-38010",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38010"
},
{
"name": "CVE-2025-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38197"
},
{
"name": "CVE-2025-39951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39951"
},
{
"name": "CVE-2025-38468",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38468"
},
{
"name": "CVE-2022-1271",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1271"
},
{
"name": "CVE-2025-40120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40120"
},
{
"name": "CVE-2024-28085",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28085"
},
{
"name": "CVE-2025-11495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11495"
},
{
"name": "CVE-2025-38688",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38688"
},
{
"name": "CVE-2025-38333",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38333"
},
{
"name": "CVE-2019-9076",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9076"
},
{
"name": "CVE-2025-37970",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37970"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-21884",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21884"
},
{
"name": "CVE-2025-37905",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37905"
},
{
"name": "CVE-2025-38390",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38390"
},
{
"name": "CVE-2025-38013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38013"
},
{
"name": "CVE-2021-20205",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20205"
},
{
"name": "CVE-2025-38059",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38059"
},
{
"name": "CVE-2025-5025",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5025"
},
{
"name": "CVE-2025-38713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38713"
},
{
"name": "CVE-2025-37956",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37956"
},
{
"name": "CVE-2025-40243",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40243"
},
{
"name": "CVE-2025-38148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38148"
},
{
"name": "CVE-2025-38467",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38467"
},
{
"name": "CVE-2024-34459",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34459"
},
{
"name": "CVE-2025-38117",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38117"
},
{
"name": "CVE-2025-38094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38094"
},
{
"name": "CVE-2025-49795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49795"
},
{
"name": "CVE-2025-14104",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14104"
},
{
"name": "CVE-2014-9913",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9913"
},
{
"name": "CVE-2025-38072",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38072"
},
{
"name": "CVE-2024-37407",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37407"
},
{
"name": "CVE-2015-4775",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4775"
},
{
"name": "CVE-2025-37967",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37967"
},
{
"name": "CVE-2025-38300",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38300"
},
{
"name": "CVE-2016-0694",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0694"
},
{
"name": "CVE-2025-38289",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38289"
},
{
"name": "CVE-2023-6228",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-6228"
},
{
"name": "CVE-2021-46848",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46848"
},
{
"name": "CVE-2025-39782",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39782"
},
{
"name": "CVE-2025-38075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38075"
},
{
"name": "CVE-2025-37885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37885"
},
{
"name": "CVE-2025-38697",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38697"
},
{
"name": "CVE-2025-1376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1376"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-37949",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37949"
},
{
"name": "CVE-2001-1269",
"url": "https://www.cve.org/CVERecord?id=CVE-2001-1269"
},
{
"name": "CVE-2025-38691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38691"
},
{
"name": "CVE-2025-38373",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38373"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-38489",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38489"
},
{
"name": "CVE-2025-66861",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66861"
},
{
"name": "CVE-2025-37957",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37957"
},
{
"name": "CVE-2024-22365",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-22365"
},
{
"name": "CVE-2025-38058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38058"
},
{
"name": "CVE-2025-38483",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38483"
},
{
"name": "CVE-2025-38369",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38369"
},
{
"name": "CVE-2024-47535",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47535"
},
{
"name": "CVE-2025-39759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39759"
},
{
"name": "CVE-2025-38639",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38639"
},
{
"name": "CVE-2025-38122",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38122"
},
{
"name": "CVE-2025-38612",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38612"
},
{
"name": "CVE-2022-50250",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-50250"
},
{
"name": "CVE-2023-0795",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0795"
},
{
"name": "CVE-2025-68160",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68160"
},
{
"name": "CVE-2015-2583",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2583"
},
{
"name": "CVE-2025-38173",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38173"
},
{
"name": "CVE-2021-29390",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-29390"
},
{
"name": "CVE-2024-2236",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2236"
},
{
"name": "CVE-2025-38143",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38143"
},
{
"name": "CVE-2025-45768",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-45768"
},
{
"name": "CVE-2025-38098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38098"
},
{
"name": "CVE-2025-38566",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38566"
},
{
"name": "CVE-2025-1365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1365"
},
{
"name": "CVE-2025-39721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39721"
},
{
"name": "CVE-2024-25062",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-25062"
},
{
"name": "CVE-2025-39760",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39760"
},
{
"name": "CVE-2025-40118",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40118"
},
{
"name": "CVE-2022-32205",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32205"
},
{
"name": "CVE-2025-38718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38718"
},
{
"name": "CVE-2023-27534",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27534"
},
{
"name": "CVE-2024-2398",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2398"
},
{
"name": "CVE-2025-38392",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38392"
},
{
"name": "CVE-2025-60753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60753"
},
{
"name": "CVE-2025-39673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39673"
},
{
"name": "CVE-2023-27536",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27536"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2025-38259",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38259"
},
{
"name": "CVE-2025-38663",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38663"
},
{
"name": "CVE-2015-4783",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4783"
},
{
"name": "CVE-2025-40021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40021"
},
{
"name": "CVE-2025-67735",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67735"
},
{
"name": "CVE-2025-38156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38156"
},
{
"name": "CVE-2015-4774",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4774"
},
{
"name": "CVE-2025-37951",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37951"
},
{
"name": "CVE-2023-50495",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-50495"
},
{
"name": "CVE-2025-37840",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37840"
},
{
"name": "CVE-2017-11164",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11164"
},
{
"name": "CVE-2025-37947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37947"
},
{
"name": "CVE-2025-61728",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61728"
},
{
"name": "CVE-2022-43551",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-43551"
},
{
"name": "CVE-2025-68972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68972"
},
{
"name": "CVE-2025-26519",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-26519"
},
{
"name": "CVE-2025-38416",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38416"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-37846",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37846"
},
{
"name": "CVE-2025-38722",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38722"
},
{
"name": "CVE-2025-38192",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38192"
},
{
"name": "CVE-2025-39800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39800"
},
{
"name": "CVE-2025-40044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40044"
},
{
"name": "CVE-2025-13034",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13034"
},
{
"name": "CVE-2021-20284",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20284"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-38343",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38343"
},
{
"name": "CVE-2023-27533",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27533"
},
{
"name": "CVE-2025-40105",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40105"
},
{
"name": "CVE-2025-38202",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38202"
},
{
"name": "CVE-2017-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7500"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-40112",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40112"
},
{
"name": "CVE-2025-22101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22101"
},
{
"name": "CVE-2021-32292",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-32292"
},
{
"name": "CVE-2025-38374",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38374"
},
{
"name": "CVE-2025-39703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39703"
},
{
"name": "CVE-2025-38194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38194"
},
{
"name": "CVE-2025-38549",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38549"
},
{
"name": "CVE-2024-10041",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-10041"
},
{
"name": "CVE-2023-1972",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1972"
},
{
"name": "CVE-2025-8869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8869"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2022-34903",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34903"
},
{
"name": "CVE-2022-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2953"
},
{
"name": "CVE-2025-38665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38665"
},
{
"name": "CVE-2024-20696",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-20696"
},
{
"name": "CVE-2025-38101",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38101"
},
{
"name": "CVE-2023-32573",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32573"
},
{
"name": "CVE-2025-37982",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37982"
},
{
"name": "CVE-2025-37992",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37992"
},
{
"name": "CVE-2025-38577",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38577"
},
{
"name": "CVE-2025-38671",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38671"
},
{
"name": "CVE-2020-19726",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-19726"
},
{
"name": "CVE-2022-3219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3219"
},
{
"name": "CVE-2025-39971",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39971"
},
{
"name": "CVE-2025-38299",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38299"
},
{
"name": "CVE-2025-40154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40154"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-38635",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38635"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2022-47010",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47010"
},
{
"name": "CVE-2025-38704",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38704"
},
{
"name": "CVE-2025-38348",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38348"
},
{
"name": "CVE-2020-22916",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-22916"
},
{
"name": "CVE-2025-38488",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38488"
},
{
"name": "CVE-2025-38540",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38540"
},
{
"name": "CVE-2025-5916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5916"
},
{
"name": "CVE-2025-38040",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38040"
},
{
"name": "CVE-2025-38265",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38265"
},
{
"name": "CVE-2025-23149",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23149"
},
{
"name": "CVE-2022-33070",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-33070"
},
{
"name": "CVE-2025-38403",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38403"
},
{
"name": "CVE-2022-23308",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23308"
},
{
"name": "CVE-2025-38552",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38552"
},
{
"name": "CVE-2025-58056",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58056"
},
{
"name": "CVE-2025-37914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37914"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2025-10911",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10911"
},
{
"name": "CVE-2025-32988",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32988"
},
{
"name": "CVE-2022-28805",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28805"
},
{
"name": "CVE-2025-37873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37873"
},
{
"name": "CVE-2024-57360",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-57360"
},
{
"name": "CVE-2025-37928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37928"
},
{
"name": "CVE-2017-3604",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3604"
},
{
"name": "CVE-2023-0804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0804"
},
{
"name": "CVE-2025-39766",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39766"
},
{
"name": "CVE-2025-39801",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39801"
},
{
"name": "CVE-2025-37922",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37922"
},
{
"name": "CVE-2025-38146",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38146"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-39724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39724"
},
{
"name": "CVE-2023-27538",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-27538"
},
{
"name": "CVE-2025-39687",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39687"
},
{
"name": "CVE-2025-37794",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37794"
},
{
"name": "CVE-2023-4641",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4641"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2025-38510",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38510"
},
{
"name": "CVE-2025-27113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-27113"
},
{
"name": "CVE-2025-38246",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38246"
},
{
"name": "CVE-2025-39758",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39758"
},
{
"name": "CVE-2025-39694",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39694"
},
{
"name": "CVE-2025-38220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38220"
},
{
"name": "CVE-2025-38405",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38405"
},
{
"name": "CVE-2026-0915",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0915"
},
{
"name": "CVE-2025-15281",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15281"
},
{
"name": "CVE-2025-38418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38418"
},
{
"name": "CVE-2025-38090",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38090"
},
{
"name": "CVE-2022-23218",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23218"
},
{
"name": "CVE-2025-38429",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38429"
},
{
"name": "CVE-2022-25236",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-25236"
},
{
"name": "CVE-2023-30775",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-30775"
},
{
"name": "CVE-2025-38225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38225"
},
{
"name": "CVE-2025-47913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47913"
},
{
"name": "CVE-2025-38155",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38155"
},
{
"name": "CVE-2023-0797",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0797"
},
{
"name": "CVE-2025-37977",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37977"
},
{
"name": "CVE-2023-37369",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-37369"
},
{
"name": "CVE-2024-48615",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-48615"
},
{
"name": "CVE-2025-38365",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38365"
},
{
"name": "CVE-2025-38415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38415"
},
{
"name": "CVE-2024-55549",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-55549"
},
{
"name": "CVE-2025-38668",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38668"
},
{
"name": "CVE-2025-37973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37973"
},
{
"name": "CVE-2025-68750",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68750"
},
{
"name": "CVE-2025-38260",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38260"
},
{
"name": "CVE-2024-6119",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6119"
},
{
"name": "CVE-2025-37827",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37827"
},
{
"name": "CVE-2025-38721",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38721"
},
{
"name": "CVE-2025-38244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38244"
},
{
"name": "CVE-2023-1916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1916"
},
{
"name": "CVE-2025-38080",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38080"
},
{
"name": "CVE-2025-40126",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40126"
},
{
"name": "CVE-2025-39972",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39972"
},
{
"name": "CVE-2025-37748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37748"
},
{
"name": "CVE-2025-38364",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38364"
},
{
"name": "CVE-2025-38615",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38615"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-40909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40909"
},
{
"name": "CVE-2023-25588",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25588"
},
{
"name": "CVE-2025-39684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39684"
},
{
"name": "CVE-2025-37836",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37836"
},
{
"name": "CVE-2025-38526",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38526"
},
{
"name": "CVE-2017-3607",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3607"
},
{
"name": "CVE-2025-38472",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38472"
},
{
"name": "CVE-2022-2520",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-2520"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-37944",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37944"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-38506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38506"
},
{
"name": "CVE-2025-38703",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38703"
},
{
"name": "CVE-2025-38494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38494"
},
{
"name": "CVE-2025-39753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39753"
},
{
"name": "CVE-2025-69418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69418"
},
{
"name": "CVE-2025-38604",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38604"
},
{
"name": "CVE-2025-38623",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38623"
},
{
"name": "CVE-2025-38193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38193"
},
{
"name": "CVE-2025-38400",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38400"
},
{
"name": "CVE-2025-4516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4516"
},
{
"name": "CVE-2025-38136",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38136"
},
{
"name": "CVE-2025-66864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66864"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-38544",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38544"
},
{
"name": "CVE-2025-37771",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37771"
},
{
"name": "CVE-2025-39797",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39797"
},
{
"name": "CVE-2025-40200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40200"
},
{
"name": "CVE-2025-38236",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38236"
},
{
"name": "CVE-2025-38725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38725"
},
{
"name": "CVE-2025-37975",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37975"
},
{
"name": "CVE-2023-41175",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-41175"
},
{
"name": "CVE-2025-40124",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40124"
},
{
"name": "CVE-2025-38347",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38347"
},
{
"name": "CVE-2025-39776",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39776"
},
{
"name": "CVE-2025-1150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1150"
},
{
"name": "CVE-2025-39880",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39880"
},
{
"name": "CVE-2025-37998",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37998"
},
{
"name": "CVE-2025-38198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38198"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-6021",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6021"
},
{
"name": "CVE-2025-23163",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23163"
},
{
"name": "CVE-2025-40094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40094"
},
{
"name": "CVE-2025-37968",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37968"
},
{
"name": "CVE-2025-38376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38376"
},
{
"name": "CVE-2025-38006",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38006"
},
{
"name": "CVE-2022-26280",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26280"
},
{
"name": "CVE-2025-0665",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0665"
},
{
"name": "CVE-2025-38437",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38437"
},
{
"name": "CVE-2025-38125",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38125"
},
{
"name": "CVE-2024-4603",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4603"
},
{
"name": "CVE-2025-38351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38351"
},
{
"name": "CVE-2025-38048",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38048"
},
{
"name": "CVE-2025-25193",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-25193"
},
{
"name": "CVE-2024-8096",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8096"
},
{
"name": "CVE-2012-0880",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0880"
},
{
"name": "CVE-2023-3576",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-3576"
},
{
"name": "CVE-2023-4806",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4806"
},
{
"name": "CVE-2025-38683",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38683"
},
{
"name": "CVE-2026-21945",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21945"
},
{
"name": "CVE-2023-47039",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-47039"
},
{
"name": "CVE-2025-39736",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39736"
},
{
"name": "CVE-2025-37757",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37757"
},
{
"name": "CVE-2018-9996",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-9996"
},
{
"name": "CVE-2023-31484",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31484"
},
{
"name": "CVE-2025-8225",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8225"
},
{
"name": "CVE-2023-29383",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-29383"
},
{
"name": "CVE-2022-32206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-32206"
},
{
"name": "CVE-2025-8224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8224"
},
{
"name": "CVE-2024-50602",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50602"
},
{
"name": "CVE-2015-7697",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7697"
},
{
"name": "CVE-2025-38009",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38009"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-40215",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40215"
},
{
"name": "CVE-2025-40111",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40111"
},
{
"name": "CVE-2025-38081",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38081"
},
{
"name": "CVE-2025-37809",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37809"
},
{
"name": "CVE-2025-40068",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40068"
},
{
"name": "CVE-2025-5245",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5245"
},
{
"name": "CVE-2025-38185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38185"
},
{
"name": "CVE-2025-39691",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39691"
},
{
"name": "CVE-2025-38406",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38406"
},
{
"name": "CVE-2021-35942",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35942"
},
{
"name": "CVE-2025-40042",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40042"
},
{
"name": "CVE-2025-32415",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32415"
},
{
"name": "CVE-2025-24855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24855"
},
{
"name": "CVE-2025-37817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37817"
},
{
"name": "CVE-2025-39890",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39890"
},
{
"name": "CVE-2025-39742",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39742"
},
{
"name": "CVE-2025-5889",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5889"
},
{
"name": "CVE-2025-22102",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22102"
},
{
"name": "CVE-2025-37987",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37987"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2016-0689",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0689"
},
{
"name": "CVE-2025-37749",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37749"
},
{
"name": "CVE-2026-22695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22695"
},
{
"name": "CVE-2026-23490",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-23490"
},
{
"name": "CVE-2025-11966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11966"
},
{
"name": "CVE-2024-36331",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-36331"
},
{
"name": "CVE-2025-39748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39748"
},
{
"name": "CVE-2014-8140",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8140"
},
{
"name": "CVE-2026-0992",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0992"
},
{
"name": "CVE-2025-38263",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38263"
},
{
"name": "CVE-2022-47011",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47011"
},
{
"name": "CVE-2025-38610",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38610"
},
{
"name": "CVE-2025-37772",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37772"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-38214",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38214"
},
{
"name": "CVE-2025-12194",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12194"
},
{
"name": "CVE-2021-3549",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3549"
},
{
"name": "CVE-2025-38560",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38560"
},
{
"name": "CVE-2025-37994",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37994"
},
{
"name": "CVE-2025-38551",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38551"
},
{
"name": "CVE-2025-38701",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38701"
},
{
"name": "CVE-2025-38218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38218"
},
{
"name": "CVE-2025-66564",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66564"
},
{
"name": "CVE-2025-38349",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38349"
},
{
"name": "CVE-2025-5244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5244"
},
{
"name": "CVE-2021-37972",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-37972"
},
{
"name": "CVE-2025-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1352"
},
{
"name": "CVE-2024-4741",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4741"
},
{
"name": "CVE-2021-33574",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-33574"
},
{
"name": "CVE-2018-1000035",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000035"
},
{
"name": "CVE-2025-39726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39726"
},
{
"name": "CVE-2023-4863",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4863"
},
{
"name": "CVE-2025-48924",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48924"
},
{
"name": "CVE-2025-38393",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38393"
},
{
"name": "CVE-2024-26256",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-26256"
},
{
"name": "CVE-2021-3326",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3326"
},
{
"name": "CVE-2021-22926",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22926"
},
{
"name": "CVE-2025-32414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-32414"
},
{
"name": "CVE-2025-37891",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37891"
},
{
"name": "CVE-2025-38249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38249"
},
{
"name": "CVE-2025-38716",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38716"
},
{
"name": "CVE-2025-39937",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39937"
},
{
"name": "CVE-2025-37858",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37858"
},
{
"name": "CVE-2023-40403",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-40403"
},
{
"name": "CVE-2025-22013",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22013"
},
{
"name": "CVE-2025-38154",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38154"
},
{
"name": "CVE-2025-38469",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38469"
},
{
"name": "CVE-2025-38581",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38581"
},
{
"name": "CVE-2021-30560",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-30560"
},
{
"name": "CVE-2025-1153",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1153"
},
{
"name": "CVE-2025-62408",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-62408"
},
{
"name": "CVE-2025-40060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40060"
},
{
"name": "CVE-2026-2003",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2003"
},
{
"name": "CVE-2025-39790",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39790"
},
{
"name": "CVE-2025-38389",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38389"
},
{
"name": "CVE-2025-38448",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38448"
},
{
"name": "CVE-2022-48281",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48281"
},
{
"name": "CVE-2021-35938",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-35938"
},
{
"name": "CVE-2025-15079",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15079"
},
{
"name": "CVE-2025-37780",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37780"
},
{
"name": "CVE-2025-37995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37995"
},
{
"name": "CVE-2025-38680",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38680"
},
{
"name": "CVE-2025-37754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37754"
},
{
"name": "CVE-2025-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1632"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2025-38497",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38497"
},
{
"name": "CVE-2025-23156",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23156"
},
{
"name": "CVE-2025-23157",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23157"
},
{
"name": "CVE-2025-38684",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38684"
},
{
"name": "CVE-2025-38165",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38165"
},
{
"name": "CVE-2022-28321",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-28321"
},
{
"name": "CVE-2025-39686",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39686"
},
{
"name": "CVE-2025-39798",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39798"
},
{
"name": "CVE-2025-38495",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38495"
},
{
"name": "CVE-2025-37808",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37808"
},
{
"name": "CVE-2017-3606",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3606"
},
{
"name": "CVE-2025-38730",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38730"
},
{
"name": "CVE-2025-38052",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38052"
},
{
"name": "CVE-2025-38377",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38377"
},
{
"name": "CVE-2024-3651",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-3651"
},
{
"name": "CVE-2025-39747",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39747"
},
{
"name": "CVE-2022-40090",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40090"
},
{
"name": "CVE-2025-68121",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68121"
},
{
"name": "CVE-2023-25434",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25434"
},
{
"name": "CVE-2024-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12243"
},
{
"name": "CVE-2025-38516",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38516"
},
{
"name": "CVE-2025-38462",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38462"
},
{
"name": "CVE-2025-38428",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38428"
},
{
"name": "CVE-2018-13410",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13410"
},
{
"name": "CVE-2025-39714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39714"
},
{
"name": "CVE-2025-38262",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38262"
},
{
"name": "CVE-2025-60876",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-60876"
},
{
"name": "CVE-2025-38138",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38138"
},
{
"name": "CVE-2025-38035",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38035"
},
{
"name": "CVE-2025-14819",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14819"
},
{
"name": "CVE-2025-37759",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37759"
},
{
"name": "CVE-2025-24928",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-24928"
},
{
"name": "CVE-2025-38414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38414"
},
{
"name": "CVE-2022-35206",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-35206"
},
{
"name": "CVE-2025-0395",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0395"
},
{
"name": "CVE-2025-11065",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11065"
},
{
"name": "CVE-2025-37933",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37933"
},
{
"name": "CVE-2025-38310",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38310"
},
{
"name": "CVE-2015-4786",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-4786"
},
{
"name": "CVE-2025-37886",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37886"
},
{
"name": "CVE-2022-38533",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-38533"
},
{
"name": "CVE-2025-37963",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37963"
},
{
"name": "CVE-2025-40297",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40297"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2022-40304",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-40304"
},
{
"name": "CVE-2025-38226",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38226"
},
{
"name": "CVE-2025-4947",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4947"
},
{
"name": "CVE-2025-39706",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39706"
},
{
"name": "CVE-2025-40178",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40178"
},
{
"name": "CVE-2023-4911",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-4911"
},
{
"name": "CVE-2025-38443",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38443"
},
{
"name": "CVE-2025-38576",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38576"
},
{
"name": "CVE-2025-39869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39869"
},
{
"name": "CVE-2025-0725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0725"
},
{
"name": "CVE-2025-37800",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37800"
},
{
"name": "CVE-2025-39985",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39985"
},
{
"name": "CVE-2025-61726",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61726"
},
{
"name": "CVE-2023-36660",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-36660"
},
{
"name": "CVE-2025-37900",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37900"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2025-1094",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1094"
},
{
"name": "CVE-2023-25585",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-25585"
},
{
"name": "CVE-2025-38439",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38439"
},
{
"name": "CVE-2025-37805",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37805"
},
{
"name": "CVE-2021-22923",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22923"
},
{
"name": "CVE-2025-41254",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41254"
},
{
"name": "CVE-2025-39719",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39719"
},
{
"name": "CVE-2025-37990",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37990"
},
{
"name": "CVE-2020-12762",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12762"
},
{
"name": "CVE-2025-38553",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38553"
},
{
"name": "CVE-2025-38190",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38190"
},
{
"name": "CVE-2025-3198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3198"
},
{
"name": "CVE-2025-38180",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38180"
},
{
"name": "CVE-2025-53864",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53864"
},
{
"name": "CVE-2025-39738",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39738"
},
{
"name": "CVE-2026-2007",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2007"
},
{
"name": "CVE-2025-38145",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38145"
},
{
"name": "CVE-2023-2953",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2953"
},
{
"name": "CVE-2024-4032",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-4032"
},
{
"name": "CVE-2025-37948",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37948"
},
{
"name": "CVE-2021-27645",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-27645"
},
{
"name": "CVE-2025-38166",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38166"
},
{
"name": "CVE-2025-37862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37862"
},
{
"name": "CVE-2025-38321",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38321"
},
{
"name": "CVE-2024-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28835"
},
{
"name": "CVE-2025-39705",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39705"
},
{
"name": "CVE-2025-37960",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37960"
},
{
"name": "CVE-2025-38045",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38045"
},
{
"name": "CVE-2025-38051",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38051"
},
{
"name": "CVE-2025-59419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59419"
},
{
"name": "CVE-2025-49796",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-49796"
},
{
"name": "CVE-2022-34526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-34526"
},
{
"name": "CVE-2025-8058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8058"
},
{
"name": "CVE-2025-39713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39713"
},
{
"name": "CVE-2025-37763",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37763"
},
{
"name": "CVE-2025-11839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11839"
},
{
"name": "CVE-2025-37954",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37954"
},
{
"name": "CVE-2024-8244",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8244"
},
{
"name": "CVE-2025-22128",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22128"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2025-37839",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37839"
},
{
"name": "CVE-2025-39744",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39744"
},
{
"name": "CVE-2025-38277",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38277"
},
{
"name": "CVE-2025-37913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37913"
},
{
"name": "CVE-2025-39756",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39756"
},
{
"name": "CVE-2025-38539",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38539"
},
{
"name": "CVE-2026-2004",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-2004"
},
{
"name": "CVE-2026-0672",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0672"
},
{
"name": "CVE-2025-8732",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8732"
},
{
"name": "CVE-2025-38044",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38044"
},
{
"name": "CVE-2022-1586",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-1586"
},
{
"name": "CVE-2025-37786",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37786"
},
{
"name": "CVE-2026-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0900"
},
{
"name": "CVE-2020-16599",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-16599"
},
{
"name": "CVE-2021-46822",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-46822"
},
{
"name": "CVE-2022-45703",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-45703"
},
{
"name": "CVE-2025-38200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38200"
},
{
"name": "CVE-2025-38480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38480"
},
{
"name": "CVE-2025-38346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38346"
},
{
"name": "CVE-2025-30204",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-30204"
},
{
"name": "CVE-2025-37959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37959"
},
{
"name": "CVE-2025-38191",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38191"
},
{
"name": "CVE-2025-39946",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39946"
},
{
"name": "CVE-2025-38062",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38062"
},
{
"name": "CVE-2025-38531",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38531"
},
{
"name": "CVE-2025-5914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-5914"
},
{
"name": "CVE-2023-39804",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39804"
},
{
"name": "CVE-2025-21919",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21919"
},
{
"name": "CVE-2025-39693",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39693"
},
{
"name": "CVE-2025-38503",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38503"
},
{
"name": "CVE-2025-38630",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38630"
},
{
"name": "CVE-2025-38131",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38131"
},
{
"name": "CVE-2023-2908",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-2908"
},
{
"name": "CVE-2023-39615",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-39615"
},
{
"name": "CVE-2017-7501",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7501"
},
{
"name": "CVE-2022-47673",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-47673"
},
{
"name": "CVE-2023-31486",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-31486"
},
{
"name": "CVE-2025-39980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39980"
},
{
"name": "CVE-2021-20197",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-20197"
},
{
"name": "CVE-2023-24056",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-24056"
},
{
"name": "CVE-2026-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0902"
},
{
"name": "CVE-2013-0340",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0340"
},
{
"name": "CVE-2025-37851",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37851"
},
{
"name": "CVE-2025-38481",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38481"
},
{
"name": "CVE-2025-38585",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38585"
},
{
"name": "CVE-2023-32611",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32611"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2026-22717",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-22717"
},
{
"name": "CVE-2024-34397",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-34397"
},
{
"name": "CVE-2025-38320",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38320"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-1151",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1151"
},
{
"name": "CVE-2025-38625",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38625"
},
{
"name": "CVE-2025-38164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38164"
},
{
"name": "CVE-2025-8177",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8177"
},
{
"name": "CVE-2025-29480",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-29480"
},
{
"name": "CVE-2025-40346",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40346"
},
{
"name": "CVE-2025-38264",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38264"
},
{
"name": "CVE-2023-1999",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1999"
},
{
"name": "CVE-2020-27618",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-27618"
},
{
"name": "CVE-2025-39676",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39676"
},
{
"name": "CVE-2025-37980",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37980"
},
{
"name": "CVE-2023-0800",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-0800"
},
{
"name": "CVE-2025-7546",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7546"
},
{
"name": "CVE-2025-38280",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38280"
},
{
"name": "CVE-2023-5388",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5388"
},
{
"name": "CVE-2025-1148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-1148"
},
{
"name": "CVE-2025-37788",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37788"
},
{
"name": "CVE-2025-38427",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38427"
},
{
"name": "CVE-2025-38084",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38084"
},
{
"name": "CVE-2022-23219",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-23219"
},
{
"name": "CVE-2015-2640",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2640"
},
{
"name": "CVE-2025-37879",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37879"
},
{
"name": "CVE-2025-38217",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38217"
},
{
"name": "CVE-2023-5752",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-5752"
},
{
"name": "CVE-2025-40030",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40030"
},
{
"name": "CVE-2025-40244",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40244"
},
{
"name": "CVE-2025-66862",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66862"
},
{
"name": "CVE-2025-37881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37881"
},
{
"name": "CVE-2025-39995",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39995"
},
{
"name": "CVE-2025-38103",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38103"
},
{
"name": "CVE-2025-38514",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38514"
},
{
"name": "CVE-2025-39783",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39783"
},
{
"name": "CVE-2025-39715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39715"
},
{
"name": "CVE-2025-38569",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38569"
},
{
"name": "CVE-2025-38255",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38255"
},
{
"name": "CVE-2025-38512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38512"
},
{
"name": "CVE-2023-1579",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-1579"
},
{
"name": "CVE-2025-68119",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68119"
},
{
"name": "CVE-2025-38622",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38622"
},
{
"name": "CVE-2021-4217",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-4217"
},
{
"name": "CVE-2023-32643",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32643"
},
{
"name": "CVE-2025-37909",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37909"
},
{
"name": "CVE-2025-38700",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38700"
},
{
"name": "CVE-2021-43396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43396"
},
{
"name": "CVE-2025-37849",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37849"
},
{
"name": "CVE-2025-38162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38162"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2025-22873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22873"
},
{
"name": "CVE-2025-38532",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38532"
},
{
"name": "CVE-2024-2961",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-2961"
},
{
"name": "CVE-2025-39712",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39712"
},
{
"name": "CVE-2024-12133",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-12133"
},
{
"name": "CVE-2025-37812",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37812"
},
{
"name": "CVE-2025-39707",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39707"
},
{
"name": "CVE-2021-22945",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-22945"
},
{
"name": "CVE-2025-37875",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37875"
},
{
"name": "CVE-2025-38410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38410"
},
{
"name": "CVE-2025-39907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39907"
},
{
"name": "CVE-2023-42366",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-42366"
},
{
"name": "CVE-2025-39781",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39781"
},
{
"name": "CVE-2025-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0167"
},
{
"name": "CVE-2026-25547",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25547"
},
{
"name": "CVE-2025-38640",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38640"
},
{
"name": "CVE-2023-38197",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38197"
},
{
"name": "CVE-2025-38476",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38476"
},
{
"name": "CVE-2025-69420",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-69420"
},
{
"name": "CVE-2025-38659",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38659"
},
{
"name": "CVE-2025-64702",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64702"
},
{
"name": "CVE-2025-47273",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47273"
},
{
"name": "CVE-2025-40140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40140"
},
{
"name": "CVE-2025-38020",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38020"
},
{
"name": "CVE-2025-15224",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15224"
},
{
"name": "CVE-2025-40223",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40223"
},
{
"name": "CVE-2025-38572",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38572"
},
{
"name": "CVE-2025-23140",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23140"
},
{
"name": "CVE-2025-23150",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23150"
},
{
"name": "CVE-2025-38460",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38460"
},
{
"name": "CVE-2025-38182",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38182"
},
{
"name": "CVE-2025-38550",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38550"
},
{
"name": "CVE-2024-53114",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53114"
},
{
"name": "CVE-2025-38275",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38275"
},
{
"name": "CVE-2022-48303",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-48303"
},
{
"name": "CVE-2025-38345",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38345"
},
{
"name": "CVE-2024-37371",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-37371"
},
{
"name": "CVE-2023-38545",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-38545"
},
{
"name": "CVE-2021-43618",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-43618"
},
{
"name": "CVE-2026-0989",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-0989"
},
{
"name": "CVE-2025-38170",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38170"
},
{
"name": "CVE-2025-39711",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39711"
},
{
"name": "CVE-2025-22115",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22115"
},
{
"name": "CVE-2025-22120",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22120"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-38535",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38535"
},
{
"name": "CVE-2025-38231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38231"
},
{
"name": "CVE-2022-26488",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-26488"
},
{
"name": "CVE-2025-37854",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-37854"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-6345",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-6345"
},
{
"name": "CVE-2025-39873",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39873"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2025-38473",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38473"
},
{
"name": "CVE-2025-38113",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38113"
},
{
"name": "CVE-2020-11023",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11023"
},
{
"name": "CVE-2025-38714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38714"
},
{
"name": "CVE-2023-32665",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-32665"
},
{
"name": "CVE-2025-23148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23148"
},
{
"name": "CVE-2025-38361",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38361"
},
{
"name": "CVE-2025-38470",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38470"
},
{
"name": "CVE-2023-23916",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-23916"
},
{
"name": "CVE-2025-38181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38181"
},
{
"name": "CVE-2025-38391",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38391"
},
{
"name": "CVE-2025-38248",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-38248"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
},
{
"name": "CVE-2025-40351",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40351"
},
{
"name": "CVE-2022-3570",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-3570"
},
{
"name": "CVE-2016-9844",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9844"
},
{
"name": "CVE-2025-40087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40087"
},
{
"name": "CVE-2025-23147",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23147"
},
{
"name": "CVE-2024-8088",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-8088"
},
{
"name": "CVE-2025-48734",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48734"
},
{
"name": "CVE-2025-39752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39752"
},
{
"name": "CVE-2026-25646",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-25646"
}
],
"initial_release_date": "2026-02-26T00:00:00",
"last_revision_date": "2026-02-26T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0218",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-26T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer un d\u00e9ni de service \u00e0 distance, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et un contournement de la politique de s\u00e9curit\u00e9.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37096",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37096"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37092",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37092"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37102",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37102"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37078",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37078"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37109",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37109"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37087",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37087"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37090",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37090"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37077",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37077"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37098",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37098"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37079",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37079"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37101",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37101"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37104",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37104"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37080",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37080"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37097",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37097"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37083",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37083"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37086",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37086"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37082",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37082"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37100",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37100"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37099",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37099"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37081",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37081"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37089",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37089"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37076",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37076"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37088",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37088"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36986",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware DSA-2025-27",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37103"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37084",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37084"
},
{
"published_at": "2026-02-26",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37110",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37110"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37093",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37093"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37085",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37085"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37095",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37095"
},
{
"published_at": "2026-02-25",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 37094",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/37094"
}
]
}
CERTFR-2026-AVI-0355
Vulnerability from certfr_avis - Published: 2026-03-25 - Updated: 2026-03-25
De multiples vulnérabilités ont été découvertes dans les produits Apple. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, un déni de service à distance et une atteinte à la confidentialité des données.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| Apple | iOS | iOS versions antérieures à 26.4 | ||
| Apple | iPadOS | iPadOS versions antérieures à 26.4 | ||
| Apple | iPadOS | iPadOS versions antérieures à 18.7.7 | ||
| Apple | Xcode | Xcode versions antérieures à 26.4 | ||
| Apple | visionOS | visionOS versions antérieures à 26.4 | ||
| Apple | watchOS | watchOS versions antérieures à 26.4 | ||
| Apple | macOS | macOS Tahoe versions antérieures à 26.4 | ||
| Apple | macOS | macOS Sonoma versions antérieures à 14.8.5 | ||
| Apple | Safari | Safari versions antérieures à 26.4 | ||
| Apple | macOS | macOS Sequoia versions antérieures à 15.7.5 | ||
| Apple | tvOS | tvOS versions antérieures à 26.4 | ||
| Apple | iOS | iOS versions antérieures à 18.7.7 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "iOS versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iPadOS versions ant\u00e9rieures \u00e0 18.7.7",
"product": {
"name": "iPadOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Xcode versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "Xcode",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "visionOS versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "visionOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "watchOS versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "watchOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Tahoe versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sonoma versions ant\u00e9rieures \u00e0 14.8.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "Safari versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "Safari",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "macOS Sequoia versions ant\u00e9rieures \u00e0 15.7.5",
"product": {
"name": "macOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "tvOS versions ant\u00e9rieures \u00e0 26.4",
"product": {
"name": "tvOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
},
{
"description": "iOS versions ant\u00e9rieures \u00e0 18.7.7",
"product": {
"name": "iOS",
"vendor": {
"name": "Apple",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2026-20684",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20684"
},
{
"name": "CVE-2026-28875",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28875"
},
{
"name": "CVE-2026-28862",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28862"
},
{
"name": "CVE-2026-20698",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20698"
},
{
"name": "CVE-2025-59775",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-59775"
},
{
"name": "CVE-2026-20664",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20664"
},
{
"name": "CVE-2026-20692",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20692"
},
{
"name": "CVE-2025-43376",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43376"
},
{
"name": "CVE-2026-28879",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28879"
},
{
"name": "CVE-2026-28834",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28834"
},
{
"name": "CVE-2026-28882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28882"
},
{
"name": "CVE-2026-20631",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20631"
},
{
"name": "CVE-2025-55753",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55753"
},
{
"name": "CVE-2026-28874",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28874"
},
{
"name": "CVE-2026-20665",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20665"
},
{
"name": "CVE-2026-28822",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28822"
},
{
"name": "CVE-2026-28827",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28827"
},
{
"name": "CVE-2026-28892",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28892"
},
{
"name": "CVE-2026-28895",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28895"
},
{
"name": "CVE-2026-28837",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28837"
},
{
"name": "CVE-2026-28878",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28878"
},
{
"name": "CVE-2026-28823",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28823"
},
{
"name": "CVE-2026-28845",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28845"
},
{
"name": "CVE-2026-28826",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28826"
},
{
"name": "CVE-2026-28886",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28886"
},
{
"name": "CVE-2026-28880",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28880"
},
{
"name": "CVE-2025-66200",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66200"
},
{
"name": "CVE-2026-20687",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20687"
},
{
"name": "CVE-2026-28866",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28866"
},
{
"name": "CVE-2026-20697",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20697"
},
{
"name": "CVE-2026-28863",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28863"
},
{
"name": "CVE-2026-28817",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28817"
},
{
"name": "CVE-2026-20637",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20637"
},
{
"name": "CVE-2026-20607",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20607"
},
{
"name": "CVE-2026-28889",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28889"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2026-28824",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28824"
},
{
"name": "CVE-2026-28844",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28844"
},
{
"name": "CVE-2026-20632",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20632"
},
{
"name": "CVE-2026-20668",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20668"
},
{
"name": "CVE-2026-28888",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28888"
},
{
"name": "CVE-2026-28852",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28852"
},
{
"name": "CVE-2026-28829",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28829"
},
{
"name": "CVE-2025-65082",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65082"
},
{
"name": "CVE-2026-28861",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28861"
},
{
"name": "CVE-2026-28894",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28894"
},
{
"name": "CVE-2026-28828",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28828"
},
{
"name": "CVE-2025-58098",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58098"
},
{
"name": "CVE-2026-28871",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28871"
},
{
"name": "CVE-2026-20688",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20688"
},
{
"name": "CVE-2026-20699",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20699"
},
{
"name": "CVE-2026-28831",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28831"
},
{
"name": "CVE-2026-28859",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28859"
},
{
"name": "CVE-2026-20694",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20694"
},
{
"name": "CVE-2026-20633",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20633"
},
{
"name": "CVE-2026-20657",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20657"
},
{
"name": "CVE-2026-28890",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28890"
},
{
"name": "CVE-2026-20651",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20651"
},
{
"name": "CVE-2026-20701",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20701"
},
{
"name": "CVE-2026-28816",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28816"
},
{
"name": "CVE-2026-28877",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28877"
},
{
"name": "CVE-2025-14524",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14524"
},
{
"name": "CVE-2026-20691",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20691"
},
{
"name": "CVE-2026-28820",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28820"
},
{
"name": "CVE-2026-28838",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28838"
},
{
"name": "CVE-2026-28842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28842"
},
{
"name": "CVE-2025-43534",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-43534"
},
{
"name": "CVE-2026-28825",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28825"
},
{
"name": "CVE-2026-28865",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28865"
},
{
"name": "CVE-2026-20660",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20660"
},
{
"name": "CVE-2026-28857",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28857"
},
{
"name": "CVE-2026-20639",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20639"
},
{
"name": "CVE-2026-20643",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20643"
},
{
"name": "CVE-2026-28818",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28818"
},
{
"name": "CVE-2026-20690",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20690"
},
{
"name": "CVE-2026-20693",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20693"
},
{
"name": "CVE-2026-28833",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28833"
},
{
"name": "CVE-2026-28876",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28876"
},
{
"name": "CVE-2026-20695",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-20695"
},
{
"name": "CVE-2026-28856",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28856"
},
{
"name": "CVE-2026-28891",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28891"
},
{
"name": "CVE-2026-28868",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28868"
},
{
"name": "CVE-2026-28841",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28841"
},
{
"name": "CVE-2026-28821",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28821"
},
{
"name": "CVE-2026-28835",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28835"
},
{
"name": "CVE-2026-28839",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28839"
},
{
"name": "CVE-2026-28867",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28867"
},
{
"name": "CVE-2026-28864",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28864"
},
{
"name": "CVE-2026-28832",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28832"
},
{
"name": "CVE-2026-28858",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28858"
},
{
"name": "CVE-2026-28870",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28870"
},
{
"name": "CVE-2026-28893",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28893"
},
{
"name": "CVE-2026-28881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-28881"
}
],
"initial_release_date": "2026-03-25T00:00:00",
"last_revision_date": "2026-03-25T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0355",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-03-25T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Apple. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, un d\u00e9ni de service \u00e0 distance et une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Apple",
"vendor_advisories": [
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126793",
"url": "https://support.apple.com/en-us/126793"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126794",
"url": "https://support.apple.com/en-us/126794"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126798",
"url": "https://support.apple.com/en-us/126798"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126800",
"url": "https://support.apple.com/en-us/126800"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126796",
"url": "https://support.apple.com/en-us/126796"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126792",
"url": "https://support.apple.com/en-us/126792"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126795",
"url": "https://support.apple.com/en-us/126795"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126799",
"url": "https://support.apple.com/en-us/126799"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126797",
"url": "https://support.apple.com/en-us/126797"
},
{
"published_at": "2026-03-24",
"title": "Bulletin de s\u00e9curit\u00e9 Apple 126801",
"url": "https://support.apple.com/en-us/126801"
}
]
}
CERTFR-2026-AVI-0112
Vulnerability from certfr_avis - Published: 2026-02-02 - Updated: 2026-02-02
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.1.7 | ||
| VMware | Tanzu Kubernetes Grid Integrated Edition | Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions antérieures à 1.24.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.2.7+LTS-T | ||
| VMware | N/A | NodeJS Buildpack versions antérieures à 1.8.74 | ||
| VMware | Tanzu Platform | Foundation Core pour VMware Tanzu Platform versions antérieures à 3.2.3 | ||
| VMware | Tanzu Platform | Telemetry pour VMware Tanzu Platform versions antérieures à 2.4.0 | ||
| VMware | N/A | Platform Automation Toolkit versions antérieures à 5.4.0 | ||
| VMware | N/A | VMware Harbor Registry versions antérieures à 2.14.0 | ||
| VMware | Tanzu Platform | Isolation Segmentation pour VMware Tanzu Platform versions antérieures à 10.3.4 |
| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.1.7",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Tanzu Kubernetes Grid Integrated Edition (TKGi) - Mgmt Console versions ant\u00e9rieures \u00e0 1.24.0",
"product": {
"name": "Tanzu Kubernetes Grid Integrated Edition",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.2.7+LTS-T",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NodeJS Buildpack versions ant\u00e9rieures \u00e0 1.8.74",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Foundation Core pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 3.2.3",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Telemetry pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 2.4.0",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Platform Automation Toolkit versions ant\u00e9rieures \u00e0 5.4.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Harbor Registry versions ant\u00e9rieures \u00e0 2.14.0",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Isolation Segmentation pour VMware Tanzu Platform versions ant\u00e9rieures \u00e0 10.3.4",
"product": {
"name": "Tanzu Platform",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-8715",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8715"
},
{
"name": "CVE-2025-53547",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53547"
},
{
"name": "CVE-2025-58183",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58183"
},
{
"name": "CVE-2025-9231",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9231"
},
{
"name": "CVE-2025-68973",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-68973"
},
{
"name": "CVE-2025-10148",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10148"
},
{
"name": "CVE-2025-14087",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14087"
},
{
"name": "CVE-2025-22872",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22872"
},
{
"name": "CVE-2025-28164",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28164"
},
{
"name": "CVE-2025-0913",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-0913"
},
{
"name": "CVE-2025-47907",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47907"
},
{
"name": "CVE-2026-24882",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24882"
},
{
"name": "CVE-2023-45288",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-45288"
},
{
"name": "CVE-2025-6075",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6075"
},
{
"name": "CVE-2025-22228",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22228"
},
{
"name": "CVE-2025-58185",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58185"
},
{
"name": "CVE-2025-55752",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55752"
},
{
"name": "CVE-2025-58767",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58767"
},
{
"name": "CVE-2024-38819",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38819"
},
{
"name": "CVE-2025-55198",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55198"
},
{
"name": "CVE-2025-15284",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-15284"
},
{
"name": "CVE-2026-1485",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1485"
},
{
"name": "CVE-2022-49390",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-49390"
},
{
"name": "CVE-2025-48060",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48060"
},
{
"name": "CVE-2025-21855",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-21855"
},
{
"name": "CVE-2024-21510",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-21510"
},
{
"name": "CVE-2025-14512",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14512"
},
{
"name": "CVE-2025-8291",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8291"
},
{
"name": "CVE-2025-61921",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61921"
},
{
"name": "CVE-2023-34231",
"url": "https://www.cve.org/CVERecord?id=CVE-2023-34231"
},
{
"name": "CVE-2025-61727",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61727"
},
{
"name": "CVE-2025-64718",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64718"
},
{
"name": "CVE-2024-28180",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-28180"
},
{
"name": "CVE-2025-65637",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65637"
},
{
"name": "CVE-2025-22233",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22233"
},
{
"name": "CVE-2025-47910",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47910"
},
{
"name": "CVE-2024-38820",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38820"
},
{
"name": "CVE-2025-10966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-10966"
},
{
"name": "CVE-2025-47906",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47906"
},
{
"name": "CVE-2025-31133",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-31133"
},
{
"name": "CVE-2025-64505",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64505"
},
{
"name": "CVE-2025-58188",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58188"
},
{
"name": "CVE-2025-4674",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4674"
},
{
"name": "CVE-2022-29526",
"url": "https://www.cve.org/CVERecord?id=CVE-2022-29526"
},
{
"name": "CVE-2025-65945",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65945"
},
{
"name": "CVE-2025-28162",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-28162"
},
{
"name": "CVE-2025-55754",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55754"
},
{
"name": "CVE-2025-64506",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64506"
},
{
"name": "CVE-2025-52881",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52881"
},
{
"name": "CVE-2025-22868",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22868"
},
{
"name": "CVE-2025-3360",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-3360"
},
{
"name": "CVE-2025-64720",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-64720"
},
{
"name": "CVE-2025-61724",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61724"
},
{
"name": "CVE-2025-61723",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61723"
},
{
"name": "CVE-2025-9232",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9232"
},
{
"name": "CVE-2025-61795",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61795"
},
{
"name": "CVE-2025-14762",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-14762"
},
{
"name": "CVE-2025-8713",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8713"
},
{
"name": "CVE-2025-66471",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66471"
},
{
"name": "CVE-2026-21441",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-21441"
},
{
"name": "CVE-2024-45337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-45337"
},
{
"name": "CVE-2024-53427",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53427"
},
{
"name": "CVE-2025-61725",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61725"
},
{
"name": "CVE-2025-65018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-65018"
},
{
"name": "CVE-2025-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7039"
},
{
"name": "CVE-2025-12818",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12818"
},
{
"name": "CVE-2025-48989",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-48989"
},
{
"name": "CVE-2026-24842",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24842"
},
{
"name": "CVE-2025-22874",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22874"
},
{
"name": "CVE-2025-55199",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-55199"
},
{
"name": "CVE-2025-61594",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61594"
},
{
"name": "CVE-2025-47912",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47912"
},
{
"name": "CVE-2025-11414",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11414"
},
{
"name": "CVE-2025-54410",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54410"
},
{
"name": "CVE-2025-52565",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-52565"
},
{
"name": "CVE-2026-24883",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24883"
},
{
"name": "CVE-2025-39964",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39964"
},
{
"name": "CVE-2025-39993",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-39993"
},
{
"name": "CVE-2025-58186",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58186"
},
{
"name": "CVE-2025-8714",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8714"
},
{
"name": "CVE-2025-9086",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9086"
},
{
"name": "CVE-2025-58187",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58187"
},
{
"name": "CVE-2025-13601",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-13601"
},
{
"name": "CVE-2025-12817",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-12817"
},
{
"name": "CVE-2025-4673",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-4673"
},
{
"name": "CVE-2025-22871",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22871"
},
{
"name": "CVE-2024-38828",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38828"
},
{
"name": "CVE-2025-6966",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6966"
},
{
"name": "CVE-2025-58181",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58181"
},
{
"name": "CVE-2025-8959",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8959"
},
{
"name": "CVE-2025-47914",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-47914"
},
{
"name": "CVE-2025-40018",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-40018"
},
{
"name": "CVE-2024-53218",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53218"
},
{
"name": "CVE-2025-67499",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-67499"
},
{
"name": "CVE-2025-58058",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58058"
},
{
"name": "CVE-2025-22869",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22869"
},
{
"name": "CVE-2025-58189",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-58189"
},
{
"name": "CVE-2025-22870",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22870"
},
{
"name": "CVE-2025-11413",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11413"
},
{
"name": "CVE-2024-23337",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-23337"
},
{
"name": "CVE-2025-61748",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61748"
},
{
"name": "CVE-2025-22235",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22235"
},
{
"name": "CVE-2025-9230",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-9230"
},
{
"name": "CVE-2025-7339",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7339"
},
{
"name": "CVE-2024-53090",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-53090"
},
{
"name": "CVE-2025-8916",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8916"
},
{
"name": "CVE-2025-23419",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-23419"
},
{
"name": "CVE-2025-8885",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-8885"
},
{
"name": "CVE-2025-41249",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41249"
},
{
"name": "CVE-2025-11412",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11412"
},
{
"name": "CVE-2026-1484",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1484"
},
{
"name": "CVE-2025-7424",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-7424"
},
{
"name": "CVE-2024-50067",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-50067"
},
{
"name": "CVE-2024-47220",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47220"
},
{
"name": "CVE-2025-54388",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-54388"
},
{
"name": "CVE-2026-1489",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-1489"
},
{
"name": "CVE-2026-24881",
"url": "https://www.cve.org/CVERecord?id=CVE-2026-24881"
},
{
"name": "CVE-2025-41242",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-41242"
},
{
"name": "CVE-2024-38816",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-38816"
},
{
"name": "CVE-2025-53057",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53057"
},
{
"name": "CVE-2025-6442",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-6442"
},
{
"name": "CVE-2025-53066",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-53066"
},
{
"name": "CVE-2016-1000027",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000027"
},
{
"name": "CVE-2025-61729",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-61729"
},
{
"name": "CVE-2025-11494",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-11494"
},
{
"name": "CVE-2024-47691",
"url": "https://www.cve.org/CVERecord?id=CVE-2024-47691"
},
{
"name": "CVE-2025-66418",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-66418"
}
],
"initial_release_date": "2026-02-02T00:00:00",
"last_revision_date": "2026-02-02T00:00:00",
"links": [],
"reference": "CERTFR-2026-AVI-0112",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2026-02-02T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de s\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36902",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36902"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36908",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36908"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36897",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36897"
},
{
"published_at": "2026-02-01",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36912",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36912"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36904",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36904"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36900",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36900"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36903",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36903"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36909",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36909"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36899",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36899"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36906",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36906"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36907",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36907"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36901",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36901"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36905",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36905"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36898",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36898"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36910",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36910"
},
{
"published_at": "2026-02-02",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 36911",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36911"
}
]
}
SUSE-SU-2026:20073-1
Vulnerability from csaf_suse - Published: 2026-01-12 11:15 - Updated: 2026-01-12 11:15| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices\n (bsc#1254157).\n- CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit`\n enabled (bsc#1254158).\n- CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with\n `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159).\n- CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced\n PNGs with 8-bit output format (bsc#1254160).\n- CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial\n transparency and gamma correction (bsc#1254480).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SL-Micro-6.2-131",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20073-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20073-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620073-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20073-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2026-01-12T11:15:01Z",
"generator": {
"date": "2026-01-12T11:15:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20073-1",
"initial_release_date": "2026-01-12T11:15:01Z",
"revision_history": [
{
"date": "2026-01-12T11:15:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-16-1.6.44-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-16-1.6.44-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-16-1.6.44-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-16-1.6.44-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.2",
"product": {
"name": "SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:transactional"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Micro 6.2",
"product_id": "SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.2"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Micro 6.2:libpng16-16-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
SUSE-SU-2025:4383-1
Vulnerability from csaf_suse - Published: 2025-12-12 13:13 - Updated: 2025-12-12 13:13| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng12 fixes the following issues:\n\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4383,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4383",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4383-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4383-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254383-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4383-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023535.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
}
],
"title": "Security update for libpng12",
"tracking": {
"current_release_date": "2025-12-12T13:13:47Z",
"generator": {
"date": "2025-12-12T13:13:47Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4383-1",
"initial_release_date": "2025-12-12T13:13:47Z",
"revision_history": [
{
"date": "2025-12-12T13:13:47Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.aarch64",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.aarch64",
"product_id": "libpng12-0-1.2.50-20.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.aarch64",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.aarch64",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.aarch64",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.aarch64",
"product_id": "libpng12-devel-1.2.50-20.6.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product": {
"name": "libpng12-0-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product_id": "libpng12-0-64bit-1.2.50-20.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product": {
"name": "libpng12-compat-devel-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product_id": "libpng12-compat-devel-64bit-1.2.50-20.6.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng12-devel-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product": {
"name": "libpng12-devel-64bit-1.2.50-20.6.1.aarch64_ilp32",
"product_id": "libpng12-devel-64bit-1.2.50-20.6.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.i586",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.i586",
"product_id": "libpng12-0-1.2.50-20.6.1.i586"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.i586",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.i586",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.i586"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.i586",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.i586",
"product_id": "libpng12-devel-1.2.50-20.6.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.ppc64le",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.ppc64le",
"product_id": "libpng12-0-1.2.50-20.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.ppc64le",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.ppc64le",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.ppc64le",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.ppc64le",
"product_id": "libpng12-devel-1.2.50-20.6.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.s390",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.s390",
"product_id": "libpng12-0-1.2.50-20.6.1.s390"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.s390",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.s390",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.s390"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.s390",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.s390",
"product_id": "libpng12-devel-1.2.50-20.6.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.s390x",
"product_id": "libpng12-0-1.2.50-20.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-0-32bit-1.2.50-20.6.1.s390x",
"product_id": "libpng12-0-32bit-1.2.50-20.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.s390x",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.50-20.6.1.s390x",
"product_id": "libpng12-compat-devel-32bit-1.2.50-20.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.s390x",
"product_id": "libpng12-devel-1.2.50-20.6.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.50-20.6.1.s390x",
"product": {
"name": "libpng12-devel-32bit-1.2.50-20.6.1.s390x",
"product_id": "libpng12-devel-32bit-1.2.50-20.6.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-0-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-0-1.2.50-20.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-0-32bit-1.2.50-20.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-compat-devel-1.2.50-20.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-compat-devel-32bit-1.2.50-20.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-devel-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-devel-1.2.50-20.6.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.50-20.6.1.x86_64",
"product": {
"name": "libpng12-devel-32bit-1.2.50-20.6.1.x86_64",
"product_id": "libpng12-devel-32bit-1.2.50-20.6.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.50-20.6.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-1.2.50-20.6.1.x86_64"
},
"product_reference": "libpng12-0-1.2.50-20.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.50-20.6.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-32bit-1.2.50-20.6.1.x86_64"
},
"product_reference": "libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.50-20.6.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-compat-devel-1.2.50-20.6.1.x86_64"
},
"product_reference": "libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.50-20.6.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-devel-1.2.50-20.6.1.x86_64"
},
"product_reference": "libpng12-devel-1.2.50-20.6.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-devel-1.2.50-20.6.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-devel-1.2.50-20.6.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-0-32bit-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-compat-devel-1.2.50-20.6.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng12-devel-1.2.50-20.6.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-12T13:13:47Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
}
]
}
SUSE-SU-2025:4432-1
Vulnerability from csaf_suse - Published: 2025-12-17 13:07 - Updated: 2025-12-17 13:07| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng12",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng12 fixes the following issues:\n\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via \n malformed palette index (bsc#1254157)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4432,SUSE-SLE-Module-Basesystem-15-SP6-2025-4432,SUSE-SLE-Module-Basesystem-15-SP7-2025-4432,openSUSE-SLE-15.6-2025-4432",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4432-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4432-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254432-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4432-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023583.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
}
],
"title": "Security update for libpng12",
"tracking": {
"current_release_date": "2025-12-17T13:07:22Z",
"generator": {
"date": "2025-12-17T13:07:22Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4432-1",
"initial_release_date": "2025-12-17T13:07:22Z",
"revision_history": [
{
"date": "2025-12-17T13:07:22Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.57-150000.4.3.1.aarch64",
"product": {
"name": "libpng12-0-1.2.57-150000.4.3.1.aarch64",
"product_id": "libpng12-0-1.2.57-150000.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"product": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"product_id": "libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"product": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"product_id": "libpng12-devel-1.2.57-150000.4.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "libpng12-0-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product_id": "libpng12-0-64bit-1.2.57-150000.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "libpng12-compat-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product_id": "libpng12-compat-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng12-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product": {
"name": "libpng12-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32",
"product_id": "libpng12-devel-64bit-1.2.57-150000.4.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.57-150000.4.3.1.i586",
"product": {
"name": "libpng12-0-1.2.57-150000.4.3.1.i586",
"product_id": "libpng12-0-1.2.57-150000.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.i586",
"product": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.i586",
"product_id": "libpng12-compat-devel-1.2.57-150000.4.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.57-150000.4.3.1.i586",
"product": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.i586",
"product_id": "libpng12-devel-1.2.57-150000.4.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"product": {
"name": "libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"product_id": "libpng12-0-1.2.57-150000.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"product": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"product_id": "libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"product": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"product_id": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.57-150000.4.3.1.s390x",
"product": {
"name": "libpng12-0-1.2.57-150000.4.3.1.s390x",
"product_id": "libpng12-0-1.2.57-150000.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"product": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"product_id": "libpng12-compat-devel-1.2.57-150000.4.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.57-150000.4.3.1.s390x",
"product": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.s390x",
"product_id": "libpng12-devel-1.2.57-150000.4.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-0-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-0-1.2.57-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-devel-1.2.57-150000.4.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"product": {
"name": "libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"product_id": "libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-0-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.aarch64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.s390x"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64"
},
"product_reference": "libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-0-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-0-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-compat-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-compat-devel-32bit-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.aarch64",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.ppc64le",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.s390x",
"openSUSE Leap 15.6:libpng12-devel-1.2.57-150000.4.3.1.x86_64",
"openSUSE Leap 15.6:libpng12-devel-32bit-1.2.57-150000.4.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:07:22Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
}
]
}
SUSE-SU-2025:21217-1
Vulnerability from csaf_suse - Published: 2025-12-16 08:31 - Updated: 2025-12-16 08:31| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-66293: Fixed out-of-bounds read in png_image_read_composite (bsc#1254480).\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157).\n- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158).\n- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159).\n- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.0-536",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21217-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21217-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521217-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21217-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2025-12-16T08:31:52Z",
"generator": {
"date": "2025-12-16T08:31:52Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21217-1",
"initial_release_date": "2025-12-16T08:31:52Z",
"revision_history": [
{
"date": "2025-12-16T08:31:52Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-2.1.aarch64",
"product": {
"name": "libpng16-16-1.6.43-2.1.aarch64",
"product_id": "libpng16-16-1.6.43-2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-2.1.s390x",
"product": {
"name": "libpng16-16-1.6.43-2.1.s390x",
"product_id": "libpng16-16-1.6.43-2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-2.1.x86_64",
"product": {
"name": "libpng16-16-1.6.43-2.1.x86_64",
"product_id": "libpng16-16-1.6.43-2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.0",
"product": {
"name": "SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.0"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-2.1.aarch64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64"
},
"product_reference": "libpng16-16-1.6.43-2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-2.1.s390x as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x"
},
"product_reference": "libpng16-16-1.6.43-2.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-2.1.x86_64 as component of SUSE Linux Micro 6.0",
"product_id": "SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
},
"product_reference": "libpng16-16-1.6.43-2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:31:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:31:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:31:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:31:52Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.aarch64",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.s390x",
"SUSE Linux Micro 6.0:libpng16-16-1.6.43-2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:31:52Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
SUSE-SU-2025:4494-1
Vulnerability from csaf_suse - Published: 2025-12-19 13:14 - Updated: 2025-12-19 13:14| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160)\n- CVE-2025-66293: Fixed LIBPNG out-of-bounds read in `png_image_read_composite` (bsc#1254480)\n- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158)\n- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159)\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4494,SUSE-SLE-Module-Basesystem-15-SP6-2025-4494,SUSE-SLE-Module-Basesystem-15-SP7-2025-4494,openSUSE-SLE-15.6-2025-4494",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4494-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4494-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254494-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4494-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023633.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2025-12-19T13:14:13Z",
"generator": {
"date": "2025-12-19T13:14:13Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4494-1",
"initial_release_date": "2025-12-19T13:14:13Z",
"revision_history": [
{
"date": "2025-12-19T13:14:13Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.40-150600.3.3.1.aarch64",
"product": {
"name": "libpng16-16-1.6.40-150600.3.3.1.aarch64",
"product_id": "libpng16-16-1.6.40-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"product_id": "libpng16-devel-1.6.40-150600.3.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"product_id": "libpng16-tools-1.6.40-150600.3.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "libpng16-16-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product_id": "libpng16-16-64bit-1.6.40-150600.3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "libpng16-compat-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product_id": "libpng16-compat-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product": {
"name": "libpng16-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32",
"product_id": "libpng16-devel-64bit-1.6.40-150600.3.3.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.40-150600.3.3.1.i586",
"product": {
"name": "libpng16-16-1.6.40-150600.3.3.1.i586",
"product_id": "libpng16-16-1.6.40-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.i586",
"product": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.i586",
"product_id": "libpng16-compat-devel-1.6.40-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.40-150600.3.3.1.i586",
"product": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.i586",
"product_id": "libpng16-devel-1.6.40-150600.3.3.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.40-150600.3.3.1.i586",
"product": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.i586",
"product_id": "libpng16-tools-1.6.40-150600.3.3.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"product_id": "libpng16-16-1.6.40-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"product_id": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"product_id": "libpng16-tools-1.6.40-150600.3.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.40-150600.3.3.1.s390x",
"product": {
"name": "libpng16-16-1.6.40-150600.3.3.1.s390x",
"product_id": "libpng16-16-1.6.40-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"product_id": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.40-150600.3.3.1.s390x",
"product": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.s390x",
"product_id": "libpng16-devel-1.6.40-150600.3.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.40-150600.3.3.1.s390x",
"product": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.s390x",
"product_id": "libpng16-tools-1.6.40-150600.3.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-16-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-16-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-devel-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.40-150600.3.3.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.x86_64",
"product_id": "libpng16-tools-1.6.40-150600.3.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp6"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product": {
"name": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-module-basesystem:15:sp7"
}
}
},
{
"category": "product_name",
"name": "openSUSE Leap 15.6",
"product": {
"name": "openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:leap:15.6"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP6",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.aarch64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.s390x as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.x86_64 as component of SUSE Linux Enterprise Module for Basesystem 15 SP7",
"product_id": "SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Module for Basesystem 15 SP7"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.aarch64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64"
},
"product_reference": "libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.ppc64le as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le"
},
"product_reference": "libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.s390x as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x"
},
"product_reference": "libpng16-tools-1.6.40-150600.3.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 15.6"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.40-150600.3.3.1.x86_64 as component of openSUSE Leap 15.6",
"product_id": "openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
},
"product_reference": "libpng16-tools-1.6.40-150600.3.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 15.6"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T13:14:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T13:14:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T13:14:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T13:14:13Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"SUSE Linux Enterprise Module for Basesystem 15 SP7:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-16-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-16-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-compat-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-compat-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-devel-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-devel-32bit-1.6.40-150600.3.3.1.x86_64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.aarch64",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.ppc64le",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.s390x",
"openSUSE Leap 15.6:libpng16-tools-1.6.40-150600.3.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-19T13:14:13Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
SUSE-SU-2026:0898-1
Vulnerability from csaf_suse - Published: 2026-03-13 15:26 - Updated: 2026-03-13 15:26| URL | Category | |||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng15",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng15 fixes the following issues:\n\n- CVE-2025-64505: heap buffer over-read in \u0027png_do_quantize\u0027 via malformed palette index (bsc#1254157).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2026-898,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2026-898",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_0898-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:0898-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-20260898-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:0898-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-March/024694.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
}
],
"title": "Security update for libpng15",
"tracking": {
"current_release_date": "2026-03-13T15:26:30Z",
"generator": {
"date": "2026-03-13T15:26:30Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:0898-1",
"initial_release_date": "2026-03-13T15:26:30Z",
"revision_history": [
{
"date": "2026-03-13T15:26:30Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.aarch64",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.aarch64",
"product_id": "libpng15-15-1.5.22-10.7.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-64bit-1.5.22-10.7.1.aarch64_ilp32",
"product": {
"name": "libpng15-15-64bit-1.5.22-10.7.1.aarch64_ilp32",
"product_id": "libpng15-15-64bit-1.5.22-10.7.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.i586",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.i586",
"product_id": "libpng15-15-1.5.22-10.7.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.ppc64le",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.ppc64le",
"product_id": "libpng15-15-1.5.22-10.7.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.s390",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.s390",
"product_id": "libpng15-15-1.5.22-10.7.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.s390x",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.s390x",
"product_id": "libpng15-15-1.5.22-10.7.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng15-15-32bit-1.5.22-10.7.1.s390x",
"product": {
"name": "libpng15-15-32bit-1.5.22-10.7.1.s390x",
"product_id": "libpng15-15-32bit-1.5.22-10.7.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng15-15-1.5.22-10.7.1.x86_64",
"product": {
"name": "libpng15-15-1.5.22-10.7.1.x86_64",
"product_id": "libpng15-15-1.5.22-10.7.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng15-15-32bit-1.5.22-10.7.1.x86_64",
"product": {
"name": "libpng15-15-32bit-1.5.22-10.7.1.x86_64",
"product_id": "libpng15-15-32bit-1.5.22-10.7.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng15-15-1.5.22-10.7.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng15-15-1.5.22-10.7.1.x86_64"
},
"product_reference": "libpng15-15-1.5.22-10.7.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng15-15-1.5.22-10.7.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng15-15-1.5.22-10.7.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng15-15-1.5.22-10.7.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-03-13T15:26:30Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
}
]
}
SUSE-SU-2025:21220-1
Vulnerability from csaf_suse - Published: 2025-12-16 08:25 - Updated: 2025-12-16 08:25| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-66293: Fixed out-of-bounds read in png_image_read_composite (bsc#1254480).\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157).\n- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158).\n- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159).\n- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLE-Micro-6.1-354",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_21220-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:21220-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-202521220-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:21220-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2025-12-16T08:25:26Z",
"generator": {
"date": "2025-12-16T08:25:26Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:21220-1",
"initial_release_date": "2025-12-16T08:25:26Z",
"revision_history": [
{
"date": "2025-12-16T08:25:26Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"product": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"product_id": "libpng16-16-1.6.43-slfo.1.1_2.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"product_id": "libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"product": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"product_id": "libpng16-16-1.6.43-slfo.1.1_2.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.x86_64",
"product": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.x86_64",
"product_id": "libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Micro 6.1",
"product": {
"name": "SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sl-micro:6.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.aarch64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64"
},
"product_reference": "libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.s390x as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x"
},
"product_reference": "libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.43-slfo.1.1_2.1.x86_64 as component of SUSE Linux Micro 6.1",
"product_id": "SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
},
"product_reference": "libpng16-16-1.6.43-slfo.1.1_2.1.x86_64",
"relates_to_product_reference": "SUSE Linux Micro 6.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:25:26Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.aarch64",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.ppc64le",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.s390x",
"SUSE Linux Micro 6.1:libpng16-16-1.6.43-slfo.1.1_2.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-16T08:25:26Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
SUSE-SU-2026:20030-1
Vulnerability from csaf_suse - Published: 2026-01-12 11:15 - Updated: 2026-01-12 11:15| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices\n (bsc#1254157).\n- CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit`\n enabled (bsc#1254158).\n- CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with\n `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159).\n- CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced\n PNGs with 8-bit output format (bsc#1254160).\n- CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial\n transparency and gamma correction (bsc#1254480).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-SLES-16.0-131",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2026_20030-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2026:20030-1",
"url": "https://www.suse.com/support/update/announcement/2026/suse-su-202620030-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2026:20030-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2026-01-12T11:15:01Z",
"generator": {
"date": "2026-01-12T11:15:01Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2026:20030-1",
"initial_release_date": "2026-01-12T11:15:01Z",
"revision_history": [
{
"date": "2026-01-12T11:15:01Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-16-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-devel-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-tools-1.6.44-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-16-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-devel-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-tools-1.6.44-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-16-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-devel-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-tools-1.6.44-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-16-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-devel-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-tools-1.6.44-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 16.0",
"product": {
"name": "SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product": {
"name": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles:16:16.0:server-sap"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server 16.0",
"product_id": "SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.s390x as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64 as component of SUSE Linux Enterprise Server for SAP applications 16.0",
"product_id": "SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP applications 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"SUSE Linux Enterprise Server for SAP applications 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:15:01Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
SUSE-SU-2025:4533-1
Vulnerability from csaf_suse - Published: 2025-12-29 16:11 - Updated: 2025-12-29 16:11| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via \n incorrect palette premultiplication (bsc#1254159)\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via \n malformed palette index (bsc#1254157)\n- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` \n with 8-bit input and `convert_to_8bit` enabled (bsc#1254158)\n- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` \n triggered via `png_image_finish_read` (bsc#1254160)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4533,SUSE-SLE-SERVER-12-SP5-LTSS-EXTENDED-SECURITY-2025-4533",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4533-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4533-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254533-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4533-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2025-12-29T16:11:25Z",
"generator": {
"date": "2025-12-29T16:11:25Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4533-1",
"initial_release_date": "2025-12-29T16:11:25Z",
"revision_history": [
{
"date": "2025-12-29T16:11:25Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.aarch64",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.aarch64",
"product_id": "libpng16-16-1.6.8-15.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.aarch64",
"product_id": "libpng16-devel-1.6.8-15.9.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.aarch64",
"product_id": "libpng16-tools-1.6.8-15.9.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product": {
"name": "libpng16-16-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product_id": "libpng16-16-64bit-1.6.8-15.9.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product": {
"name": "libpng16-compat-devel-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product_id": "libpng16-compat-devel-64bit-1.6.8-15.9.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-devel-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product": {
"name": "libpng16-devel-64bit-1.6.8-15.9.1.aarch64_ilp32",
"product_id": "libpng16-devel-64bit-1.6.8-15.9.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.i586",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.i586",
"product_id": "libpng16-16-1.6.8-15.9.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.i586",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.i586",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.i586",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.i586",
"product_id": "libpng16-devel-1.6.8-15.9.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.i586",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.i586",
"product_id": "libpng16-tools-1.6.8-15.9.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.ppc64le",
"product_id": "libpng16-16-1.6.8-15.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.ppc64le",
"product_id": "libpng16-devel-1.6.8-15.9.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.ppc64le",
"product_id": "libpng16-tools-1.6.8-15.9.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.s390",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.s390",
"product_id": "libpng16-16-1.6.8-15.9.1.s390"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.s390",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.s390",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.s390"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.s390",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.s390",
"product_id": "libpng16-devel-1.6.8-15.9.1.s390"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.s390",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.s390",
"product_id": "libpng16-tools-1.6.8-15.9.1.s390"
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.s390x",
"product_id": "libpng16-16-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-16-32bit-1.6.8-15.9.1.s390x",
"product_id": "libpng16-16-32bit-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.s390x",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.8-15.9.1.s390x",
"product_id": "libpng16-compat-devel-32bit-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.s390x",
"product_id": "libpng16-devel-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-devel-32bit-1.6.8-15.9.1.s390x",
"product_id": "libpng16-devel-32bit-1.6.8-15.9.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.s390x",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.s390x",
"product_id": "libpng16-tools-1.6.8-15.9.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-16-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-16-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-16-32bit-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-compat-devel-32bit-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-devel-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-devel-32bit-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-devel-32bit-1.6.8-15.9.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.8-15.9.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.8-15.9.1.x86_64",
"product_id": "libpng16-tools-1.6.8-15.9.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product": {
"name": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss-extended-security:12:sp5"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.8-15.9.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64"
},
"product_reference": "libpng16-16-1.6.8-15.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.8-15.9.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.8-15.9.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.8-15.9.1.x86_64 as component of SUSE Linux Enterprise Server LTSS Extended Security 12 SP5",
"product_id": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.8-15.9.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server LTSS Extended Security 12 SP5"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-29T16:11:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-29T16:11:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-29T16:11:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-16-32bit-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-compat-devel-1.6.8-15.9.1.x86_64",
"SUSE Linux Enterprise Server LTSS Extended Security 12 SP5:libpng16-devel-1.6.8-15.9.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-29T16:11:25Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
}
]
}
SUSE-SU-2025:4436-1
Vulnerability from csaf_suse - Published: 2025-12-17 13:56 - Updated: 2025-12-17 13:56| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-65018: Fixed heap buffer overflow in `png_combine_row` triggered via `png_image_finish_read` (bsc#1254160)\n- CVE-2025-66293: Fixed LIBPNG out-of-bounds read in `png_image_read_composite` (bsc#1254480)\n- CVE-2025-64506: Fixed heap buffer over-read in `png_write_image_8bit` with 8-bit input and `convert_to_8bit` enabled (bsc#1254158)\n- CVE-2025-64720: Fixed buffer overflow in `png_image_read_composite` via incorrect palette premultiplication (bsc#1254159)\n- CVE-2025-64505: Fixed heap buffer over-read in `png_do_quantize` via malformed palette index (bsc#1254157)\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "SUSE-2025-4436,SUSE-SLE-Micro-5.3-2025-4436,SUSE-SLE-Micro-5.4-2025-4436,SUSE-SLE-Micro-5.5-2025-4436,SUSE-SLE-Product-HPC-15-SP3-LTSS-2025-4436,SUSE-SLE-Product-HPC-15-SP4-ESPOS-2025-4436,SUSE-SLE-Product-HPC-15-SP4-LTSS-2025-4436,SUSE-SLE-Product-HPC-15-SP5-ESPOS-2025-4436,SUSE-SLE-Product-HPC-15-SP5-LTSS-2025-4436,SUSE-SLE-Product-SLES-15-SP3-LTSS-2025-4436,SUSE-SLE-Product-SLES-15-SP4-LTSS-2025-4436,SUSE-SLE-Product-SLES-15-SP5-LTSS-2025-4436,SUSE-SLE-Product-SLES_SAP-15-SP3-2025-4436,SUSE-SLE-Product-SLES_SAP-15-SP4-2025-4436,SUSE-SLE-Product-SLES_SAP-15-SP5-2025-4436,SUSE-SLE-Product-SUSE-Manager-Proxy-4.3-LTS-2025-4436,SUSE-SLE-Product-SUSE-Manager-Server-4.3-LTS-2025-4436,SUSE-SUSE-MicroOS-5.2-2025-4436,SUSE-Storage-7.1-2025-4436",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/suse-su-2025_4436-1.json"
},
{
"category": "self",
"summary": "URL for SUSE-SU-2025:4436-1",
"url": "https://www.suse.com/support/update/announcement/2025/suse-su-20254436-1/"
},
{
"category": "self",
"summary": "E-Mail link for SUSE-SU-2025:4436-1",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2025-12-17T13:56:16Z",
"generator": {
"date": "2025-12-17T13:56:16Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "SUSE-SU-2025:4436-1",
"initial_release_date": "2025-12-17T13:56:16Z",
"revision_history": [
{
"date": "2025-12-17T13:56:16Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"product": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"product_id": "libpng16-16-1.6.34-150000.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"product_id": "libpng16-devel-1.6.34-150000.3.12.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.34-150000.3.12.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.34-150000.3.12.1.aarch64",
"product_id": "libpng16-tools-1.6.34-150000.3.12.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product": {
"name": "libpng16-16-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product_id": "libpng16-16-64bit-1.6.34-150000.3.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product": {
"name": "libpng16-compat-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product_id": "libpng16-compat-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32"
}
},
{
"category": "product_version",
"name": "libpng16-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product": {
"name": "libpng16-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32",
"product_id": "libpng16-devel-64bit-1.6.34-150000.3.12.1.aarch64_ilp32"
}
}
],
"category": "architecture",
"name": "aarch64_ilp32"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.34-150000.3.12.1.i586",
"product": {
"name": "libpng16-16-1.6.34-150000.3.12.1.i586",
"product_id": "libpng16-16-1.6.34-150000.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.i586",
"product": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.i586",
"product_id": "libpng16-compat-devel-1.6.34-150000.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.34-150000.3.12.1.i586",
"product": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.i586",
"product_id": "libpng16-devel-1.6.34-150000.3.12.1.i586"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.34-150000.3.12.1.i586",
"product": {
"name": "libpng16-tools-1.6.34-150000.3.12.1.i586",
"product_id": "libpng16-tools-1.6.34-150000.3.12.1.i586"
}
}
],
"category": "architecture",
"name": "i586"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"product_id": "libpng16-16-1.6.34-150000.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"product_id": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.34-150000.3.12.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.34-150000.3.12.1.ppc64le",
"product_id": "libpng16-tools-1.6.34-150000.3.12.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"product": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"product_id": "libpng16-16-1.6.34-150000.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"product_id": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"product": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"product_id": "libpng16-devel-1.6.34-150000.3.12.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.34-150000.3.12.1.s390x",
"product": {
"name": "libpng16-tools-1.6.34-150000.3.12.1.s390x",
"product_id": "libpng16-tools-1.6.34-150000.3.12.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-16-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-compat-devel-32bit-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-devel-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-devel-32bit-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-devel-32bit-1.6.34-150000.3.12.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.34-150000.3.12.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.34-150000.3.12.1.x86_64",
"product_id": "libpng16-tools-1.6.34-150000.3.12.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.3",
"product": {
"name": "SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.4",
"product": {
"name": "SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.5",
"product": {
"name": "SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle-micro:5.5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-espos:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sle_hpc-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product": {
"name": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles-ltss:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp4"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product": {
"name": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_identification_helper": {
"cpe": "cpe:/o:suse:sles_sap:15:sp5"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Proxy LTS 4.3",
"product": {
"name": "SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-proxy-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Manager Server LTS 4.3",
"product": {
"name": "SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-manager-server-lts:4.3"
}
}
},
{
"category": "product_name",
"name": "SUSE Linux Enterprise Micro 5.2",
"product": {
"name": "SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse-microos:5.2"
}
}
},
{
"category": "product_name",
"name": "SUSE Enterprise Storage 7.1",
"product": {
"name": "SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1",
"product_identification_helper": {
"cpe": "cpe:/o:suse:ses:7.1"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.3",
"product_id": "SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.4",
"product_id": "SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.5",
"product_id": "SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP3-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP3-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP4-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP4-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server 15 SP5-LTSS",
"product_id": "SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server 15 SP5-LTSS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP3",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP4",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP4"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 15 SP5",
"product_id": "SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 15 SP5"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Proxy LTS 4.3",
"product_id": "SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Proxy LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.s390x as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Manager Server LTS 4.3",
"product_id": "SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Manager Server LTS 4.3"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.s390x as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.s390x",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Linux Enterprise Micro 5.2",
"product_id": "SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Linux Enterprise Micro 5.2"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.34-150000.3.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.aarch64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.34-150000.3.12.1.x86_64 as component of SUSE Enterprise Storage 7.1",
"product_id": "SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"relates_to_product_reference": "SUSE Enterprise Storage 7.1"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:56:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:56:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:56:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:56:16Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Enterprise Storage 7.1:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-ESPOS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise High Performance Computing 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.2:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Micro 5.5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP3-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP4-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.aarch64",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Linux Enterprise Server 15 SP5-LTSS:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP4:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Linux Enterprise Server for SAP Applications 15 SP5:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Proxy LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-16-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-16-32bit-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-compat-devel-1.6.34-150000.3.12.1.x86_64",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.ppc64le",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.s390x",
"SUSE Manager Server LTS 4.3:libpng16-devel-1.6.34-150000.3.12.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-17T13:56:16Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
OPENSUSE-SU-2025:15781-1
Vulnerability from csaf_opensuse - Published: 2025-11-28 00:00 - Updated: 2025-11-28 00:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libpng16-16-1.6.51-1.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libpng16-16-1.6.51-1.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15781",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15781-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
}
],
"title": "libpng16-16-1.6.51-1.1 on GA media",
"tracking": {
"current_release_date": "2025-11-28T00:00:00Z",
"generator": {
"date": "2025-11-28T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15781-1",
"initial_release_date": "2025-11-28T00:00:00Z",
"revision_history": [
{
"date": "2025-11-28T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-16-1.6.51-1.1.aarch64",
"product_id": "libpng16-16-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-16-32bit-1.6.51-1.1.aarch64",
"product_id": "libpng16-16-32bit-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"product_id": "libpng16-16-x86-64-v3-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.51-1.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"product_id": "libpng16-compat-devel-32bit-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.51-1.1.aarch64",
"product_id": "libpng16-devel-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-devel-32bit-1.6.51-1.1.aarch64",
"product_id": "libpng16-devel-32bit-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"product_id": "libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.51-1.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.51-1.1.aarch64",
"product_id": "libpng16-tools-1.6.51-1.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.51-1.1.ppc64le",
"product_id": "libpng16-16-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-16-32bit-1.6.51-1.1.ppc64le",
"product_id": "libpng16-16-32bit-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"product_id": "libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.51-1.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"product_id": "libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.51-1.1.ppc64le",
"product_id": "libpng16-devel-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"product_id": "libpng16-devel-32bit-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"product_id": "libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.51-1.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.51-1.1.ppc64le",
"product_id": "libpng16-tools-1.6.51-1.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-16-1.6.51-1.1.s390x",
"product_id": "libpng16-16-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-16-32bit-1.6.51-1.1.s390x",
"product_id": "libpng16-16-32bit-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"product_id": "libpng16-16-x86-64-v3-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.51-1.1.s390x",
"product_id": "libpng16-compat-devel-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"product_id": "libpng16-compat-devel-32bit-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-devel-1.6.51-1.1.s390x",
"product_id": "libpng16-devel-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-devel-32bit-1.6.51-1.1.s390x",
"product_id": "libpng16-devel-32bit-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"product_id": "libpng16-devel-x86-64-v3-1.6.51-1.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.51-1.1.s390x",
"product": {
"name": "libpng16-tools-1.6.51-1.1.s390x",
"product_id": "libpng16-tools-1.6.51-1.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-16-1.6.51-1.1.x86_64",
"product_id": "libpng16-16-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-32bit-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-16-32bit-1.6.51-1.1.x86_64",
"product_id": "libpng16-16-32bit-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"product_id": "libpng16-16-x86-64-v3-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.51-1.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"product_id": "libpng16-compat-devel-32bit-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.51-1.1.x86_64",
"product_id": "libpng16-devel-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-32bit-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-devel-32bit-1.6.51-1.1.x86_64",
"product_id": "libpng16-devel-32bit-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"product_id": "libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.51-1.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.51-1.1.x86_64",
"product_id": "libpng16-tools-1.6.51-1.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-16-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-16-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-16-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-16-32bit-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-16-32bit-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-16-32bit-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-32bit-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-16-32bit-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-32bit-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-devel-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-32bit-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-devel-32bit-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-32bit-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-32bit-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-devel-32bit-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-32bit-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-devel-32bit-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.51-1.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64"
},
"product_reference": "libpng16-tools-1.6.51-1.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.51-1.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le"
},
"product_reference": "libpng16-tools-1.6.51-1.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.51-1.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x"
},
"product_reference": "libpng16-tools-1.6.51-1.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.51-1.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
},
"product_reference": "libpng16-tools-1.6.51-1.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-16-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-compat-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-32bit-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-devel-x86-64-v3-1.6.51-1.1.x86_64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.aarch64",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.ppc64le",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.s390x",
"openSUSE Tumbleweed:libpng16-tools-1.6.51-1.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-11-28T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
}
]
}
OPENSUSE-SU-2025:15797-1
Vulnerability from csaf_opensuse - Published: 2025-12-04 00:00 - Updated: 2025-12-04 00:00{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "libpng12-0-1.2.59-4.1 on GA media",
"title": "Title of the patch"
},
{
"category": "description",
"text": "These are all security issues fixed in the libpng12-0-1.2.59-4.1 package on the GA media of openSUSE Tumbleweed.",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Tumbleweed-2025-15797",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2025_15797-1.json"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
}
],
"title": "libpng12-0-1.2.59-4.1 on GA media",
"tracking": {
"current_release_date": "2025-12-04T00:00:00Z",
"generator": {
"date": "2025-12-04T00:00:00Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2025:15797-1",
"initial_release_date": "2025-12-04T00:00:00Z",
"revision_history": [
{
"date": "2025-12-04T00:00:00Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-0-1.2.59-4.1.aarch64",
"product_id": "libpng12-0-1.2.59-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-0-32bit-1.2.59-4.1.aarch64",
"product_id": "libpng12-0-32bit-1.2.59-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-compat-devel-1.2.59-4.1.aarch64",
"product_id": "libpng12-compat-devel-1.2.59-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"product_id": "libpng12-compat-devel-32bit-1.2.59-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-devel-1.2.59-4.1.aarch64",
"product_id": "libpng12-devel-1.2.59-4.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.59-4.1.aarch64",
"product": {
"name": "libpng12-devel-32bit-1.2.59-4.1.aarch64",
"product_id": "libpng12-devel-32bit-1.2.59-4.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-0-1.2.59-4.1.ppc64le",
"product_id": "libpng12-0-1.2.59-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-0-32bit-1.2.59-4.1.ppc64le",
"product_id": "libpng12-0-32bit-1.2.59-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-compat-devel-1.2.59-4.1.ppc64le",
"product_id": "libpng12-compat-devel-1.2.59-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"product_id": "libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-devel-1.2.59-4.1.ppc64le",
"product_id": "libpng12-devel-1.2.59-4.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"product": {
"name": "libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"product_id": "libpng12-devel-32bit-1.2.59-4.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-0-1.2.59-4.1.s390x",
"product_id": "libpng12-0-1.2.59-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-0-32bit-1.2.59-4.1.s390x",
"product_id": "libpng12-0-32bit-1.2.59-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-compat-devel-1.2.59-4.1.s390x",
"product_id": "libpng12-compat-devel-1.2.59-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"product_id": "libpng12-compat-devel-32bit-1.2.59-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-devel-1.2.59-4.1.s390x",
"product_id": "libpng12-devel-1.2.59-4.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.59-4.1.s390x",
"product": {
"name": "libpng12-devel-32bit-1.2.59-4.1.s390x",
"product_id": "libpng12-devel-32bit-1.2.59-4.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng12-0-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-0-1.2.59-4.1.x86_64",
"product_id": "libpng12-0-1.2.59-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-0-32bit-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-0-32bit-1.2.59-4.1.x86_64",
"product_id": "libpng12-0-32bit-1.2.59-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-compat-devel-1.2.59-4.1.x86_64",
"product_id": "libpng12-compat-devel-1.2.59-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"product_id": "libpng12-compat-devel-32bit-1.2.59-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-devel-1.2.59-4.1.x86_64",
"product_id": "libpng12-devel-1.2.59-4.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng12-devel-32bit-1.2.59-4.1.x86_64",
"product": {
"name": "libpng12-devel-32bit-1.2.59-4.1.x86_64",
"product_id": "libpng12-devel-32bit-1.2.59-4.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Tumbleweed",
"product": {
"name": "openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed",
"product_identification_helper": {
"cpe": "cpe:/o:opensuse:tumbleweed"
}
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-0-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-0-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-0-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-0-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-0-32bit-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-0-32bit-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-0-32bit-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-0-32bit-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-0-32bit-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-compat-devel-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-compat-devel-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-compat-devel-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-compat-devel-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-compat-devel-32bit-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-devel-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-devel-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-devel-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-devel-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-32bit-1.2.59-4.1.aarch64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.aarch64"
},
"product_reference": "libpng12-devel-32bit-1.2.59-4.1.aarch64",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-32bit-1.2.59-4.1.ppc64le as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.ppc64le"
},
"product_reference": "libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-32bit-1.2.59-4.1.s390x as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.s390x"
},
"product_reference": "libpng12-devel-32bit-1.2.59-4.1.s390x",
"relates_to_product_reference": "openSUSE Tumbleweed"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng12-devel-32bit-1.2.59-4.1.x86_64 as component of openSUSE Tumbleweed",
"product_id": "openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.x86_64"
},
"product_reference": "libpng12-devel-32bit-1.2.59-4.1.x86_64",
"relates_to_product_reference": "openSUSE Tumbleweed"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-0-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-compat-devel-32bit-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-1.2.59-4.1.x86_64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.aarch64",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.ppc64le",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.s390x",
"openSUSE Tumbleweed:libpng12-devel-32bit-1.2.59-4.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2025-12-04T00:00:00Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
}
]
}
OPENSUSE-SU-2026:20017-1
Vulnerability from csaf_opensuse - Published: 2026-01-12 11:14 - Updated: 2026-01-12 11:14| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"namespace": "https://www.suse.com/support/security/rating/",
"text": "important"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright 2024 SUSE LLC. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Security update for libpng16",
"title": "Title of the patch"
},
{
"category": "description",
"text": "This update for libpng16 fixes the following issues:\n\n- CVE-2025-64505: heap buffer over-read in `png_do_quantize` when processing PNG files malformed palette indices\n (bsc#1254157).\n- CVE-2025-64506: heap buffer over-read in `png_write_image_8bit` when processing 8-bit input with `convert_to_8bit`\n enabled (bsc#1254158).\n- CVE-2025-64720: out-of-bounds read in `png_image_read_composite` when processing palette images with\n `PNG_FLAG_OPTIMIZE_ALPHA` enabled (bsc#1254159).\n- CVE-2025-65018: heap buffer overflow in `png_image_finish_read` when processing specially crafted 16-bit interlaced\n PNGs with 8-bit output format (bsc#1254160).\n- CVE-2025-66293: out-of-bounds read of the `png_sRGB_base` array when processing palette PNG images with partial\n transparency and gamma correction (bsc#1254480).\n",
"title": "Description of the patch"
},
{
"category": "details",
"text": "openSUSE-Leap-16.0-131",
"title": "Patchnames"
},
{
"category": "legal_disclaimer",
"text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).",
"title": "Terms of use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://www.suse.com/support/security/contact/",
"name": "SUSE Product Security Team",
"namespace": "https://www.suse.com/"
},
"references": [
{
"category": "external",
"summary": "SUSE ratings",
"url": "https://www.suse.com/support/security/rating/"
},
{
"category": "self",
"summary": "URL of this CSAF notice",
"url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2026_20017-1.json"
},
{
"category": "self",
"summary": "SUSE Bug 1254157",
"url": "https://bugzilla.suse.com/1254157"
},
{
"category": "self",
"summary": "SUSE Bug 1254158",
"url": "https://bugzilla.suse.com/1254158"
},
{
"category": "self",
"summary": "SUSE Bug 1254159",
"url": "https://bugzilla.suse.com/1254159"
},
{
"category": "self",
"summary": "SUSE Bug 1254160",
"url": "https://bugzilla.suse.com/1254160"
},
{
"category": "self",
"summary": "SUSE Bug 1254480",
"url": "https://bugzilla.suse.com/1254480"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64505 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64505/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64506 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64506/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-64720 page",
"url": "https://www.suse.com/security/cve/CVE-2025-64720/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-65018 page",
"url": "https://www.suse.com/security/cve/CVE-2025-65018/"
},
{
"category": "self",
"summary": "SUSE CVE CVE-2025-66293 page",
"url": "https://www.suse.com/security/cve/CVE-2025-66293/"
}
],
"title": "Security update for libpng16",
"tracking": {
"current_release_date": "2026-01-12T11:14:46Z",
"generator": {
"date": "2026-01-12T11:14:46Z",
"engine": {
"name": "cve-database.git:bin/generate-csaf.pl",
"version": "1"
}
},
"id": "openSUSE-SU-2026:20017-1",
"initial_release_date": "2026-01-12T11:14:46Z",
"revision_history": [
{
"date": "2026-01-12T11:14:46Z",
"number": "1",
"summary": "Current version"
}
],
"status": "final",
"version": "1"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-16-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-devel-1.6.44-160000.3.1.aarch64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"product_id": "libpng16-tools-1.6.44-160000.3.1.aarch64"
}
}
],
"category": "architecture",
"name": "aarch64"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-16-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-devel-1.6.44-160000.3.1.ppc64le"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"product_id": "libpng16-tools-1.6.44-160000.3.1.ppc64le"
}
}
],
"category": "architecture",
"name": "ppc64le"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-16-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-devel-1.6.44-160000.3.1.s390x"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.s390x",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.s390x",
"product_id": "libpng16-tools-1.6.44-160000.3.1.s390x"
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-16-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-devel-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
}
},
{
"category": "product_version",
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"product": {
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"product_id": "libpng16-tools-1.6.44-160000.3.1.x86_64"
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_name",
"name": "openSUSE Leap 16.0",
"product": {
"name": "openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0"
}
}
],
"category": "product_family",
"name": "SUSE Linux Enterprise"
}
],
"category": "vendor",
"name": "SUSE"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.aarch64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.aarch64",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.ppc64le as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.ppc64le",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.s390x as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.s390x",
"relates_to_product_reference": "openSUSE Leap 16.0"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "libpng16-tools-1.6.44-160000.3.1.x86_64 as component of openSUSE Leap 16.0",
"product_id": "openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
},
"product_reference": "libpng16-tools-1.6.44-160000.3.1.x86_64",
"relates_to_product_reference": "openSUSE Leap 16.0"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64505"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64505",
"url": "https://www.suse.com/security/cve/CVE-2025-64505"
},
{
"category": "external",
"summary": "SUSE Bug 1254157 for CVE-2025-64505",
"url": "https://bugzilla.suse.com/1254157"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:14:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64506"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_write_image_8bit function when processing 8-bit images through the simplified write API with convert_to_8bit enabled. The vulnerability affects 8-bit grayscale+alpha, RGB/RGBA, and images with incomplete row data. A conditional guard incorrectly allows 8-bit input to enter code expecting 16-bit input, causing reads up to 2 bytes beyond allocated buffer boundaries. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64506",
"url": "https://www.suse.com/security/cve/CVE-2025-64506"
},
{
"category": "external",
"summary": "SUSE Bug 1254158 for CVE-2025-64506",
"url": "https://bugzilla.suse.com/1254158"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:14:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-64720"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, an out-of-bounds read vulnerability exists in png_image_read_composite when processing palette images with PNG_FLAG_OPTIMIZE_ALPHA enabled. The palette compositing code in png_init_read_transformations incorrectly applies background compositing during premultiplication, violating the invariant component \u2264 alpha x 257 required by the simplified PNG API. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-64720",
"url": "https://www.suse.com/security/cve/CVE-2025-64720"
},
{
"category": "external",
"summary": "SUSE Bug 1254159 for CVE-2025-64720",
"url": "https://bugzilla.suse.com/1254159"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:14:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-65018"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. From version 1.6.0 to before 1.6.51, there is a heap buffer overflow vulnerability in the libpng simplified API function png_image_finish_read when processing 16-bit interlaced PNGs with 8-bit output format. Attacker-crafted interlaced PNG files cause heap writes beyond allocated buffer bounds. This issue has been patched in version 1.6.51.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-65018",
"url": "https://www.suse.com/security/cve/CVE-2025-65018"
},
{
"category": "external",
"summary": "SUSE Bug 1254160 for CVE-2025-65018",
"url": "https://bugzilla.suse.com/1254160"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:14:46Z",
"details": "moderate"
}
],
"title": "CVE-2025-65018"
},
{
"cve": "CVE-2025-66293",
"ids": [
{
"system_name": "SUSE CVE Page",
"text": "https://www.suse.com/security/cve/CVE-2025-66293"
}
],
"notes": [
{
"category": "general",
"text": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to 1.6.52, an out-of-bounds read vulnerability in libpng\u0027s simplified API allows reading up to 1012 bytes beyond the png_sRGB_base[512] array when processing valid palette PNG images with partial transparency and gamma correction. The PNG files that trigger this vulnerability are valid per the PNG specification; the bug is in libpng\u0027s internal state management. Upgrade to libpng 1.6.52 or later.",
"title": "CVE description"
}
],
"product_status": {
"recommended": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
},
"references": [
{
"category": "external",
"summary": "CVE-2025-66293",
"url": "https://www.suse.com/security/cve/CVE-2025-66293"
},
{
"category": "external",
"summary": "SUSE Bug 1254480 for CVE-2025-66293",
"url": "https://bugzilla.suse.com/1254480"
}
],
"remediations": [
{
"category": "vendor_fix",
"details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n",
"product_ids": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.1,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-16-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-16-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-compat-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-compat-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-devel-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-devel-x86-64-v3-1.6.44-160000.3.1.x86_64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.aarch64",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.ppc64le",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.s390x",
"openSUSE Leap 16.0:libpng16-tools-1.6.44-160000.3.1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"date": "2026-01-12T11:14:46Z",
"details": "important"
}
],
"title": "CVE-2025-66293"
}
]
}
NCSC-2026-0102
Vulnerability from csaf_ncscnl - Published: 2026-03-25 14:15 - Updated: 2026-03-25 14:15A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.
Multiple vulnerabilities affect Oracle Communications Unified Assurance and Apache HTTP Server, including critical data compromise, denial of service, and issues in mod_md (ACME) components across various versions.
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (pre-2.4.66), including issues with Server Side Includes, mod_cgid, mod_md, and mod_userdir+suexec, leading to data compromise, denial of service, and information disclosure.
Multiple vulnerabilities affect Oracle Secure Backup and Apache HTTP Server, including unauthorized data modification, SSRF leading to NTLM hash leakage, and sensitive information disclosure across various versions and configurations.
Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.0-2.4.65), including CGI environment variable overrides, improper neutralization of environment variables, and other security issues leading to data compromise and denial of service.
Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.7-2.4.65), including privilege escalation, mod_userdir+suexec bypass, and information disclosure issues.
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing protected user data.
An elevation of privilege vulnerability in macOS Tahoe 26.4 was addressed by implementing enhanced logic checks to prevent unauthorized privilege escalation.
macOS Tahoe 26.4 fixed a parsing vulnerability in directory path handling that previously allowed applications to access sensitive user data by enhancing path validation mechanisms.
macOS versions Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 fixed a security issue involving symlink handling that previously allowed apps to access user-sensitive data.
A use after free vulnerability causing unexpected system termination was fixed by improving memory management across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
An integer overflow vulnerability causing potential heap corruption from processing maliciously crafted strings was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3 by improving input validation.
Multiple Apple OS updates including Safari, iOS, iPadOS, and macOS addressed a cross-origin vulnerability in the Navigation API by improving input validation to prevent bypassing the Same Origin Policy.
A privacy vulnerability related to temporary file handling that allowed unauthorized app access to sensitive user data was resolved in macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, and macOS Tahoe 26.3.
Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.
A path handling vulnerability allowing remote users to write arbitrary files was fixed in multiple Apple operating systems and Safari versions through improved logic preventing unauthorized file writes.
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.
A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.
A permissions issue in macOS Tahoe 26.4 was fixed by implementing additional restrictions to prevent an app from bypassing Gatekeeper security checks.
A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.
A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.
An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.
An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.
A privacy issue affecting user preferences for mail content handling, specifically the 'Hide IP Address' and 'Block All Remote Content' features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.
An issue allowing an attacker with root privileges to delete protected system files was resolved through improved state management in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.
Multiple versions of iOS, iPadOS, and macOS addressed a vulnerability involving improper handling of symlinks that could allow an app to access user-sensitive data.
An information disclosure vulnerability allowing applications to determine kernel memory layout was fixed by improving memory management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing sensitive user data.
A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.
A downgrade vulnerability on Intel-based Macs allowing potential access to user-sensitive data was mitigated by enhanced code-signing restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3/26.4.
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed an access issue by implementing additional sandbox restrictions to prevent apps from connecting to network shares without user consent.
A path handling vulnerability allowing unauthorized file deletion was fixed through improved validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A race condition vulnerability allowing sandboxed processes to bypass restrictions was fixed by improving state handling in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A logging issue allowing apps to access sensitive user data was fixed through improved data redaction in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
macOS Tahoe 26.4 addressed a security issue by implementing enhanced validation checks to prevent unauthorized app access to sensitive user data.
A validation issue in entitlement verification that could allow an app to gain elevated privileges was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 through improved process entitlement validation.
A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.
A path handling vulnerability in macOS Tahoe 26.4 allowed applications with root privileges to delete protected system files, which was resolved through improved validation mechanisms.
An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
An out-of-bounds write vulnerability allowing applications to modify protected file system areas was fixed by improving bounds checking in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A logic flaw in macOS Tahoe 26.4 allowed a malicious application to escape its sandbox, which was addressed by implementing enhanced sandbox restrictions.
A parsing vulnerability in directory path handling that could allow an application to escape its sandbox was fixed through enhanced path validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A permissions vulnerability allowing applications to access sensitive user data was fixed by removing the vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent applications from modifying protected parts of the file system.
An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
An out-of-bounds read vulnerability in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 was fixed by improving bounds checking to prevent potential kernel memory disclosure by applications.
A permissions issue allowing apps to enumerate a user’s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.
A race condition causing potential unexpected system termination was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 by improving state handling to address the issue.
A use-after-free vulnerability in SMB network share mounting was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4, addressing a memory management flaw that could cause system termination.
macOS Tahoe 26.4 addressed a logic flaw that previously allowed applications to improperly access sensitive user data by implementing enhanced validation checks.
A permissions issue allowing an app to potentially escape its sandbox was fixed by implementing additional sandbox restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
An issue allowing applications to access sensitive user data was resolved through enhanced verification mechanisms in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.
A buffer overflow vulnerability in macOS Tahoe 26.4 was addressed by enhancing size validation to prevent potential memory corruption and application crashes.
The buffer overflow vulnerability causing memory corruption and application termination was addressed in macOS Tahoe 26.4 through enhanced bounds checking.
An input validation vulnerability in macOS Tahoe 26.4 was addressed, preventing unauthorized access to the file system.
An authorization vulnerability in macOS Tahoe 26.4 was addressed by enhancing state management to prevent unauthorized access to protected user data.
A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.
A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.
macOS updates Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 enhance private data redaction in log entries to prevent applications from accessing sensitive user information.
Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users' Keychain items.
An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.
Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.
A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.
A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.
An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.
A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.
An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.
Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.
A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user’s installed applications.
macOS Tahoe 26.4 fixed a privacy vulnerability by relocating sensitive user data to prevent unauthorized app access.
An issue allowing apps to enumerate a user's installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
A race condition vulnerability allowing an application to potentially gain root privileges was fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4 by improving state handling.
A race condition vulnerability allowing an application to potentially escape its sandbox was fixed through additional validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A permissions vulnerability allowing applications to modify protected file system areas was fixed by removing vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.
A privacy vulnerability involving the handling of temporary files during print preview was addressed in the macOS Tahoe 26.4 update.
A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in macOS (Specifiek voor Sequoia 15.7.5, Sonoma 14.8.5, en Tahoe 26.4).",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen zoals onvoldoende validatie van invoer, onjuiste afhandeling van geheugen, en problemen met machtigingen die konden leiden tot ongeautoriseerde toegang tot gevoelige gebruikersdata. Aanvallers kunnen deze kwetsbaarheden misbruiken om toegang te krijgen tot beschermde systeembestanden, gegevens te wijzigen, of zelfs de stabiliteit van het systeem in gevaar te brengen. De kwetsbaarheden zijn opgelost door verbeterde validatie- en beveiligingsmechanismen in de betrokken macOS-versies.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Input Validation",
"title": "CWE-20"
},
{
"category": "general",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "general",
"text": "Improper Neutralization of Special Elements used in a Command (\u0027Command Injection\u0027)",
"title": "CWE-77"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "general",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "general",
"text": "Privilege Issues",
"title": "CWE-265"
},
{
"category": "general",
"text": "Permission Issues",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Access Control",
"title": "CWE-284"
},
{
"category": "general",
"text": "Improper Authorization",
"title": "CWE-285"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "general",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
},
{
"category": "general",
"text": "Origin Validation Error",
"title": "CWE-346"
},
{
"category": "general",
"text": "Concurrent Execution using Shared Resource with Improper Synchronization (\u0027Race Condition\u0027)",
"title": "CWE-362"
},
{
"category": "general",
"text": "State Issues",
"title": "CWE-371"
},
{
"category": "general",
"text": "Insecure Temporary File",
"title": "CWE-377"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "general",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "general",
"text": "Permissive Cross-domain Security Policy with Untrusted Domains",
"title": "CWE-942"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126794"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126795"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126796"
}
],
"title": "Kwetsbaarheden verholpen in Apple macOS",
"tracking": {
"current_release_date": "2026-03-25T14:15:56.073353Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0102",
"initial_release_date": "2026-03-25T14:15:56.073353Z",
"revision_history": [
{
"date": "2026-03-25T14:15:56.073353Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "Mac OS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "description",
"text": "A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-55753",
"cwe": {
"id": "CWE-190",
"name": "Integer Overflow or Wraparound"
},
"notes": [
{
"category": "other",
"text": "Integer Overflow or Wraparound",
"title": "CWE-190"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance and Apache HTTP Server, including critical data compromise, denial of service, and issues in mod_md (ACME) components across various versions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-55753 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-55753.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-55753"
},
{
"cve": "CVE-2025-58098",
"cwe": {
"id": "CWE-201",
"name": "Insertion of Sensitive Information Into Sent Data"
},
"notes": [
{
"category": "other",
"text": "Insertion of Sensitive Information Into Sent Data",
"title": "CWE-201"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (pre-2.4.66), including issues with Server Side Includes, mod_cgid, mod_md, and mod_userdir+suexec, leading to data compromise, denial of service, and information disclosure.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-58098 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-58098.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.3,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-58098"
},
{
"cve": "CVE-2025-59775",
"cwe": {
"id": "CWE-918",
"name": "Server-Side Request Forgery (SSRF)"
},
"notes": [
{
"category": "other",
"text": "Server-Side Request Forgery (SSRF)",
"title": "CWE-918"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Secure Backup and Apache HTTP Server, including unauthorized data modification, SSRF leading to NTLM hash leakage, and sensitive information disclosure across various versions and configurations.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-59775 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-59775.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-59775"
},
{
"cve": "CVE-2025-64505",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-65082",
"cwe": {
"id": "CWE-150",
"name": "Improper Neutralization of Escape, Meta, or Control Sequences"
},
"notes": [
{
"category": "other",
"text": "Improper Neutralization of Escape, Meta, or Control Sequences",
"title": "CWE-150"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.0-2.4.65), including CGI environment variable overrides, improper neutralization of environment variables, and other security issues leading to data compromise and denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-65082 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-65082.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-65082"
},
{
"cve": "CVE-2025-66200",
"cwe": {
"id": "CWE-288",
"name": "Authentication Bypass Using an Alternate Path or Channel"
},
"notes": [
{
"category": "other",
"text": "Authentication Bypass Using an Alternate Path or Channel",
"title": "CWE-288"
},
{
"category": "other",
"text": "Authentication Bypass by Primary Weakness",
"title": "CWE-305"
},
{
"category": "description",
"text": "Multiple vulnerabilities affect Oracle Communications Unified Assurance (6.1.0-6.1.1) and Apache HTTP Server (2.4.7-2.4.65), including privilege escalation, mod_userdir+suexec bypass, and information disclosure issues.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-66200 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-66200.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2025-66200"
},
{
"cve": "CVE-2026-20607",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing protected user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20607 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20607.json"
}
],
"title": "CVE-2026-20607"
},
{
"cve": "CVE-2026-20631",
"notes": [
{
"category": "description",
"text": "An elevation of privilege vulnerability in macOS Tahoe 26.4 was addressed by implementing enhanced logic checks to prevent unauthorized privilege escalation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20631 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20631.json"
}
],
"title": "CVE-2026-20631"
},
{
"cve": "CVE-2026-20632",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 fixed a parsing vulnerability in directory path handling that previously allowed applications to access sensitive user data by enhancing path validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20632 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20632.json"
}
],
"title": "CVE-2026-20632"
},
{
"cve": "CVE-2026-20633",
"notes": [
{
"category": "description",
"text": "macOS versions Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 fixed a security issue involving symlink handling that previously allowed apps to access user-sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20633 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20633.json"
}
],
"title": "CVE-2026-20633"
},
{
"cve": "CVE-2026-20637",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability causing unexpected system termination was fixed by improving memory management across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20637 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20637.json"
}
],
"title": "CVE-2026-20637"
},
{
"cve": "CVE-2026-20639",
"notes": [
{
"category": "description",
"text": "An integer overflow vulnerability causing potential heap corruption from processing maliciously crafted strings was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3 by improving input validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20639 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20639.json"
}
],
"title": "CVE-2026-20639"
},
{
"cve": "CVE-2026-20643",
"cwe": {
"id": "CWE-346",
"name": "Origin Validation Error"
},
"notes": [
{
"category": "other",
"text": "Origin Validation Error",
"title": "CWE-346"
},
{
"category": "description",
"text": "Multiple Apple OS updates including Safari, iOS, iPadOS, and macOS addressed a cross-origin vulnerability in the Navigation API by improving input validation to prevent bypassing the Same Origin Policy.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20643 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20643.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.4,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-20643"
},
{
"cve": "CVE-2026-20651",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability related to temporary file handling that allowed unauthorized app access to sensitive user data was resolved in macOS Sequoia 15.7.5, macOS Sonoma 14.8.4, and macOS Tahoe 26.3.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20651 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20651.json"
}
],
"title": "CVE-2026-20651"
},
{
"cve": "CVE-2026-20657",
"notes": [
{
"category": "description",
"text": "Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20657 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20657.json"
}
],
"title": "CVE-2026-20657"
},
{
"cve": "CVE-2026-20660",
"cwe": {
"id": "CWE-22",
"name": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)"
},
"notes": [
{
"category": "other",
"text": "Improper Limitation of a Pathname to a Restricted Directory (\u0027Path Traversal\u0027)",
"title": "CWE-22"
},
{
"category": "description",
"text": "A path handling vulnerability allowing remote users to write arbitrary files was fixed in multiple Apple operating systems and Safari versions through improved logic preventing unauthorized file writes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20660 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20660.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1"
]
}
],
"title": "CVE-2026-20660"
},
{
"cve": "CVE-2026-20664",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20664 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20664.json"
}
],
"title": "CVE-2026-20664"
},
{
"cve": "CVE-2026-20665",
"notes": [
{
"category": "description",
"text": "Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20665.json"
}
],
"title": "CVE-2026-20665"
},
{
"cve": "CVE-2026-20668",
"notes": [
{
"category": "description",
"text": "A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20668 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20668.json"
}
],
"title": "CVE-2026-20668"
},
{
"cve": "CVE-2026-20684",
"notes": [
{
"category": "description",
"text": "A permissions issue in macOS Tahoe 26.4 was fixed by implementing additional restrictions to prevent an app from bypassing Gatekeeper security checks.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20684 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20684.json"
}
],
"title": "CVE-2026-20684"
},
{
"cve": "CVE-2026-20687",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20687.json"
}
],
"title": "CVE-2026-20687"
},
{
"cve": "CVE-2026-20688",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20688 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20688.json"
}
],
"title": "CVE-2026-20688"
},
{
"cve": "CVE-2026-20690",
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20690 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20690.json"
}
],
"title": "CVE-2026-20690"
},
{
"cve": "CVE-2026-20691",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20691.json"
}
],
"title": "CVE-2026-20691"
},
{
"cve": "CVE-2026-20692",
"notes": [
{
"category": "description",
"text": "A privacy issue affecting user preferences for mail content handling, specifically the \u0027Hide IP Address\u0027 and \u0027Block All Remote Content\u0027 features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20692.json"
}
],
"title": "CVE-2026-20692"
},
{
"cve": "CVE-2026-20693",
"notes": [
{
"category": "description",
"text": "An issue allowing an attacker with root privileges to delete protected system files was resolved through improved state management in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20693 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20693.json"
}
],
"title": "CVE-2026-20693"
},
{
"cve": "CVE-2026-20694",
"notes": [
{
"category": "description",
"text": "Multiple versions of iOS, iPadOS, and macOS addressed a vulnerability involving improper handling of symlinks that could allow an app to access user-sensitive data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20694 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20694.json"
}
],
"title": "CVE-2026-20694"
},
{
"cve": "CVE-2026-20695",
"notes": [
{
"category": "description",
"text": "An information disclosure vulnerability allowing applications to determine kernel memory layout was fixed by improving memory management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20695 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20695.json"
}
],
"title": "CVE-2026-20695"
},
{
"cve": "CVE-2026-20697",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent apps from accessing sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20697 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20697.json"
}
],
"title": "CVE-2026-20697"
},
{
"cve": "CVE-2026-20698",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20698.json"
}
],
"title": "CVE-2026-20698"
},
{
"cve": "CVE-2026-20699",
"notes": [
{
"category": "description",
"text": "A downgrade vulnerability on Intel-based Macs allowing potential access to user-sensitive data was mitigated by enhanced code-signing restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.3/26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20699 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20699.json"
}
],
"title": "CVE-2026-20699"
},
{
"cve": "CVE-2026-20701",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed an access issue by implementing additional sandbox restrictions to prevent apps from connecting to network shares without user consent.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20701 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20701.json"
}
],
"title": "CVE-2026-20701"
},
{
"cve": "CVE-2026-28816",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing unauthorized file deletion was fixed through improved validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28816 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28816.json"
}
],
"title": "CVE-2026-28816"
},
{
"cve": "CVE-2026-28817",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing sandboxed processes to bypass restrictions was fixed by improving state handling in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28817 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28817.json"
}
],
"title": "CVE-2026-28817"
},
{
"cve": "CVE-2026-28818",
"notes": [
{
"category": "description",
"text": "A logging issue allowing apps to access sensitive user data was fixed through improved data redaction in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28818 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28818.json"
}
],
"title": "CVE-2026-28818"
},
{
"cve": "CVE-2026-28820",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 addressed a security issue by implementing enhanced validation checks to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28820 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28820.json"
}
],
"title": "CVE-2026-28820"
},
{
"cve": "CVE-2026-28821",
"notes": [
{
"category": "description",
"text": "A validation issue in entitlement verification that could allow an app to gain elevated privileges was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 through improved process entitlement validation.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28821 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28821.json"
}
],
"title": "CVE-2026-28821"
},
{
"cve": "CVE-2026-28822",
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28822 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28822.json"
}
],
"title": "CVE-2026-28822"
},
{
"cve": "CVE-2026-28823",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability in macOS Tahoe 26.4 allowed applications with root privileges to delete protected system files, which was resolved through improved validation mechanisms.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28823 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28823.json"
}
],
"title": "CVE-2026-28823"
},
{
"cve": "CVE-2026-28824",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28824 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28824.json"
}
],
"title": "CVE-2026-28824"
},
{
"cve": "CVE-2026-28825",
"notes": [
{
"category": "description",
"text": "An out-of-bounds write vulnerability allowing applications to modify protected file system areas was fixed by improving bounds checking in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28825 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28825.json"
}
],
"title": "CVE-2026-28825"
},
{
"cve": "CVE-2026-28826",
"notes": [
{
"category": "description",
"text": "A logic flaw in macOS Tahoe 26.4 allowed a malicious application to escape its sandbox, which was addressed by implementing enhanced sandbox restrictions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28826 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28826.json"
}
],
"title": "CVE-2026-28826"
},
{
"cve": "CVE-2026-28827",
"notes": [
{
"category": "description",
"text": "A parsing vulnerability in directory path handling that could allow an application to escape its sandbox was fixed through enhanced path validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28827 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28827.json"
}
],
"title": "CVE-2026-28827"
},
{
"cve": "CVE-2026-28828",
"notes": [
{
"category": "description",
"text": "A permissions vulnerability allowing applications to access sensitive user data was fixed by removing the vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28828 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28828.json"
}
],
"title": "CVE-2026-28828"
},
{
"cve": "CVE-2026-28829",
"notes": [
{
"category": "description",
"text": "macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 addressed a permissions issue by implementing additional restrictions to prevent applications from modifying protected parts of the file system.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28829 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28829.json"
}
],
"title": "CVE-2026-28829"
},
{
"cve": "CVE-2026-28831",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing applications to access sensitive user data was resolved by enhancing state management in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28831 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28831.json"
}
],
"title": "CVE-2026-28831"
},
{
"cve": "CVE-2026-28832",
"notes": [
{
"category": "description",
"text": "An out-of-bounds read vulnerability in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 was fixed by improving bounds checking to prevent potential kernel memory disclosure by applications.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28832 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28832.json"
}
],
"title": "CVE-2026-28832"
},
{
"cve": "CVE-2026-28833",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to enumerate a user\u2019s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28833.json"
}
],
"title": "CVE-2026-28833"
},
{
"cve": "CVE-2026-28834",
"notes": [
{
"category": "description",
"text": "A race condition causing potential unexpected system termination was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 by improving state handling to address the issue.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28834 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28834.json"
}
],
"title": "CVE-2026-28834"
},
{
"cve": "CVE-2026-28835",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability in SMB network share mounting was fixed in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4, addressing a memory management flaw that could cause system termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28835 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28835.json"
}
],
"title": "CVE-2026-28835"
},
{
"cve": "CVE-2026-28837",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 addressed a logic flaw that previously allowed applications to improperly access sensitive user data by implementing enhanced validation checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28837 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28837.json"
}
],
"title": "CVE-2026-28837"
},
{
"cve": "CVE-2026-28838",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing an app to potentially escape its sandbox was fixed by implementing additional sandbox restrictions in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28838 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28838.json"
}
],
"title": "CVE-2026-28838"
},
{
"cve": "CVE-2026-28839",
"notes": [
{
"category": "description",
"text": "An issue allowing applications to access sensitive user data was resolved through enhanced verification mechanisms in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28839 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28839.json"
}
],
"title": "CVE-2026-28839"
},
{
"cve": "CVE-2026-28841",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in macOS Tahoe 26.4 was addressed by enhancing size validation to prevent potential memory corruption and application crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28841 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28841.json"
}
],
"title": "CVE-2026-28841"
},
{
"cve": "CVE-2026-28842",
"notes": [
{
"category": "description",
"text": "The buffer overflow vulnerability causing memory corruption and application termination was addressed in macOS Tahoe 26.4 through enhanced bounds checking.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28842 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28842.json"
}
],
"title": "CVE-2026-28842"
},
{
"cve": "CVE-2026-28844",
"notes": [
{
"category": "description",
"text": "An input validation vulnerability in macOS Tahoe 26.4 was addressed, preventing unauthorized access to the file system.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28844 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28844.json"
}
],
"title": "CVE-2026-28844"
},
{
"cve": "CVE-2026-28845",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in macOS Tahoe 26.4 was addressed by enhancing state management to prevent unauthorized access to protected user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28845 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28845.json"
}
],
"title": "CVE-2026-28845"
},
{
"cve": "CVE-2026-28852",
"notes": [
{
"category": "description",
"text": "A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28852 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28852.json"
}
],
"title": "CVE-2026-28852"
},
{
"cve": "CVE-2026-28857",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28857.json"
}
],
"title": "CVE-2026-28857"
},
{
"cve": "CVE-2026-28859",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28859 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28859.json"
}
],
"title": "CVE-2026-28859"
},
{
"cve": "CVE-2026-28861",
"notes": [
{
"category": "description",
"text": "A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28861 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28861.json"
}
],
"title": "CVE-2026-28861"
},
{
"cve": "CVE-2026-28862",
"notes": [
{
"category": "description",
"text": "macOS updates Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4 enhance private data redaction in log entries to prevent applications from accessing sensitive user information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28862 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28862.json"
}
],
"title": "CVE-2026-28862"
},
{
"cve": "CVE-2026-28864",
"notes": [
{
"category": "description",
"text": "Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users\u0027 Keychain items.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28864.json"
}
],
"title": "CVE-2026-28864"
},
{
"cve": "CVE-2026-28865",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28865.json"
}
],
"title": "CVE-2026-28865"
},
{
"cve": "CVE-2026-28866",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28866.json"
}
],
"title": "CVE-2026-28866"
},
{
"cve": "CVE-2026-28867",
"notes": [
{
"category": "description",
"text": "A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28867 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28867.json"
}
],
"title": "CVE-2026-28867"
},
{
"cve": "CVE-2026-28868",
"notes": [
{
"category": "description",
"text": "A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28868 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28868.json"
}
],
"title": "CVE-2026-28868"
},
{
"cve": "CVE-2026-28870",
"notes": [
{
"category": "description",
"text": "An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28870 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28870.json"
}
],
"title": "CVE-2026-28870"
},
{
"cve": "CVE-2026-28871",
"notes": [
{
"category": "description",
"text": "A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28871.json"
}
],
"title": "CVE-2026-28871"
},
{
"cve": "CVE-2026-28876",
"notes": [
{
"category": "description",
"text": "A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28876.json"
}
],
"title": "CVE-2026-28876"
},
{
"cve": "CVE-2026-28877",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28877 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28877.json"
}
],
"title": "CVE-2026-28877"
},
{
"cve": "CVE-2026-28878",
"notes": [
{
"category": "description",
"text": "Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28878.json"
}
],
"title": "CVE-2026-28878"
},
{
"cve": "CVE-2026-28879",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28879.json"
}
],
"title": "CVE-2026-28879"
},
{
"cve": "CVE-2026-28880",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user\u2019s installed applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28880.json"
}
],
"title": "CVE-2026-28880"
},
{
"cve": "CVE-2026-28881",
"notes": [
{
"category": "description",
"text": "macOS Tahoe 26.4 fixed a privacy vulnerability by relocating sensitive user data to prevent unauthorized app access.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28881 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28881.json"
}
],
"title": "CVE-2026-28881"
},
{
"cve": "CVE-2026-28882",
"notes": [
{
"category": "description",
"text": "An issue allowing apps to enumerate a user\u0027s installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28882.json"
}
],
"title": "CVE-2026-28882"
},
{
"cve": "CVE-2026-28886",
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28886 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28886.json"
}
],
"title": "CVE-2026-28886"
},
{
"cve": "CVE-2026-28888",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing an application to potentially gain root privileges was fixed in macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, and macOS Tahoe 26.4 by improving state handling.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28888 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28888.json"
}
],
"title": "CVE-2026-28888"
},
{
"cve": "CVE-2026-28891",
"notes": [
{
"category": "description",
"text": "A race condition vulnerability allowing an application to potentially escape its sandbox was fixed through additional validation in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28891 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28891.json"
}
],
"title": "CVE-2026-28891"
},
{
"cve": "CVE-2026-28892",
"notes": [
{
"category": "description",
"text": "A permissions vulnerability allowing applications to modify protected file system areas was fixed by removing vulnerable code in macOS Sequoia 15.7.5, Sonoma 14.8.5, and Tahoe 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28892 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28892.json"
}
],
"title": "CVE-2026-28892"
},
{
"cve": "CVE-2026-28893",
"notes": [
{
"category": "description",
"text": "A privacy vulnerability involving the handling of temporary files during print preview was addressed in the macOS Tahoe 26.4 update.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28893 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28893.json"
}
],
"title": "CVE-2026-28893"
},
{
"cve": "CVE-2026-28894",
"notes": [
{
"category": "description",
"text": "A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28894 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28894.json"
}
],
"title": "CVE-2026-28894"
}
]
}
NCSC-2026-0101
Vulnerability from csaf_ncscnl - Published: 2026-03-25 14:02 - Updated: 2026-03-25 14:02A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.
A logic issue affecting state management in multiple Apple OS versions was fixed to prevent remote attackers from viewing leaked DNS queries when Private Relay is enabled.
An improved validation fixed a path handling vulnerability in iOS 18.7.7, iPadOS 18.7.7, iOS 26.2, and iPadOS 26.2 that could allow a user with physical access to bypass Activation Lock.
Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.
Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.
Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.
A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.
A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.
A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.
An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.
An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.
A privacy issue affecting user preferences for mail content handling, specifically the 'Hide IP Address' and 'Block All Remote Content' features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.
A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.
A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.
A permissions issue allowing apps to enumerate a user’s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.
A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
An authentication vulnerability allowing physical attackers to access sensitive user information on locked devices was fixed in iOS 26.4, iPadOS 26.4, visionOS 26.4, and watchOS 26.4.
Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.
A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by improved bounds checking to prevent remote system termination or kernel memory corruption.
A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.
A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.
A permissions issue allowing apps to fingerprint users was fixed by adding restrictions in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users' Keychain items.
An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.
Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.
A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.
A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.
An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.
iOS 26.4 and iPadOS 26.4 addressed an issue where improved validation checks prevent remote attackers from causing unexpected app termination.
A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by implementing improved bounds checking to prevent remote denial-of-service attacks.
A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.
An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.
Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.
A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user’s installed applications.
An issue allowing apps to enumerate a user's installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.
A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.
A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.
iOS and iPadOS 16.4 fixed a vulnerability allowing attackers with physical access to bypass biometrics-gated Protected Apps by using the passcode on devices with Stolen Device Protection enabled through improved verification checks.
| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "Apple heeft meerdere kwetsbaarheden verholpen in iOS en iPadOS.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten verschillende problemen zoals onjuist padbeheer, geheugenbeheer, en onvoldoende validatie van invoer, die konden leiden tot ongeautoriseerde toegang tot gevoelige gegevens, onverwachte applicatie-terminaties, en andere beveiligingsrisico\u0027s. Aanvallers kunnen deze kwetsbaarheden misbruiken door bijvoorbeeld kwaadaardige webinhoud te verwerken of door gebruik te maken van onvoldoende beveiligde applicaties. De kwetsbaarheden zijn opgelost door verbeterde validatie- en beveiligingsmechanismen in de betrokken besturingssystemen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "Apple heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"title": "CWE-79"
},
{
"category": "general",
"text": "Improper Restriction of Operations within the Bounds of a Memory Buffer",
"title": "CWE-119"
},
{
"category": "general",
"text": "Heap-based Buffer Overflow",
"title": "CWE-122"
},
{
"category": "general",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
},
{
"category": "general",
"text": "Permission Issues",
"title": "CWE-275"
},
{
"category": "general",
"text": "Improper Authentication",
"title": "CWE-287"
},
{
"category": "general",
"text": "State Issues",
"title": "CWE-371"
},
{
"category": "general",
"text": "Improper Resource Shutdown or Release",
"title": "CWE-404"
},
{
"category": "general",
"text": "Use After Free",
"title": "CWE-416"
},
{
"category": "general",
"text": "NULL Pointer Dereference",
"title": "CWE-476"
},
{
"category": "general",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "general",
"text": "Insertion of Sensitive Information into Log File",
"title": "CWE-532"
},
{
"category": "general",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126792"
},
{
"category": "external",
"summary": "Reference",
"url": "https://support.apple.com/en-us/126793"
}
],
"title": "Kwetsbaarheden verholpen in Apple iOS en iPadOS",
"tracking": {
"current_release_date": "2026-03-25T14:02:07.392994Z",
"generator": {
"date": "2025-08-04T16:30:00Z",
"engine": {
"name": "V.A.",
"version": "1.3"
}
},
"id": "NCSC-2026-0101",
"initial_release_date": "2026-03-25T14:02:07.392994Z",
"revision_history": [
{
"date": "2026-03-25T14:02:07.392994Z",
"number": "1.0.0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-1"
}
}
],
"category": "product_name",
"name": "iOS"
},
{
"branches": [
{
"category": "product_version_range",
"name": "vers:unknown/*",
"product": {
"name": "vers:unknown/*",
"product_id": "CSAFPID-2"
}
}
],
"category": "product_name",
"name": "iPadOS"
}
],
"category": "vendor",
"name": "Apple"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-14524",
"cwe": {
"id": "CWE-522",
"name": "Insufficiently Protected Credentials"
},
"notes": [
{
"category": "other",
"text": "Insufficiently Protected Credentials",
"title": "CWE-522"
},
{
"category": "other",
"text": "URL Redirection to Untrusted Site (\u0027Open Redirect\u0027)",
"title": "CWE-601"
},
{
"category": "description",
"text": "A vulnerability in libcurl versions 7.33.0 to 8.17.0 causes OAuth2 bearer tokens to be unintentionally leaked during cross-protocol redirects involving IMAP, LDAP, POP3, or SMTP schemes, potentially exposing sensitive information.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-14524 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-14524.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-14524"
},
{
"cve": "CVE-2025-43376",
"notes": [
{
"category": "description",
"text": "A logic issue affecting state management in multiple Apple OS versions was fixed to prevent remote attackers from viewing leaked DNS queries when Private Relay is enabled.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43376 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43376.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-43376"
},
{
"cve": "CVE-2025-43534",
"notes": [
{
"category": "description",
"text": "An improved validation fixed a path handling vulnerability in iOS 18.7.7, iPadOS 18.7.7, iOS 26.2, and iPadOS 26.2 that could allow a user with physical access to bypass Activation Lock.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-43534 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-43534.json"
}
],
"title": "CVE-2025-43534"
},
{
"cve": "CVE-2025-64505",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"notes": [
{
"category": "other",
"text": "Out-of-bounds Read",
"title": "CWE-125"
},
{
"category": "description",
"text": "Multiple vulnerabilities in libpng, including heap buffer overflows and over-reads in functions like png_do_quantize, affect various products including NetApp and Apple software, alongside a separate Oracle MySQL Workbench flaw allowing unauthorized data modification or denial of service.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2025/cve-2025-64505.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-1",
"CSAFPID-2"
]
}
],
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2026-20657",
"notes": [
{
"category": "description",
"text": "Improved memory handling in iOS 18.7.7, iPadOS 18.7.7, macOS Sequoia 15.7.5, and macOS Sonoma 14.8.5 fixed an issue where parsing a maliciously crafted file could cause unexpected app termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20657 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20657.json"
}
],
"title": "CVE-2026-20657"
},
{
"cve": "CVE-2026-20665",
"notes": [
{
"category": "description",
"text": "Apple fixed a vulnerability in multiple operating systems and Safari versions 26.4 and iOS/iPadOS 18.7.7 where malicious web content could bypass Content Security Policy enforcement due to improper state management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20665 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20665.json"
}
],
"title": "CVE-2026-20665"
},
{
"cve": "CVE-2026-20668",
"notes": [
{
"category": "description",
"text": "A logging issue affecting iOS, iPadOS, macOS, and visionOS was fixed by enhancing data redaction to prevent apps from accessing sensitive user information.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20668 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20668.json"
}
],
"title": "CVE-2026-20668"
},
{
"cve": "CVE-2026-20687",
"notes": [
{
"category": "description",
"text": "A use after free vulnerability in multiple Apple operating systems was fixed by improving memory management to prevent apps from causing unexpected system termination or writing to kernel memory.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20687 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20687.json"
}
],
"title": "CVE-2026-20687"
},
{
"cve": "CVE-2026-20688",
"notes": [
{
"category": "description",
"text": "A path handling vulnerability allowing applications to potentially escape their sandbox was fixed through improved validation in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Sonoma 14.8.5, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20688 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20688.json"
}
],
"title": "CVE-2026-20688"
},
{
"cve": "CVE-2026-20690",
"notes": [
{
"category": "description",
"text": "An out-of-bounds access vulnerability in Apple operating systems was fixed by improving bounds checking to prevent process termination caused by maliciously crafted audio streams.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20690 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20690.json"
}
],
"title": "CVE-2026-20690"
},
{
"cve": "CVE-2026-20691",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability in Safari 26.4 and related OS versions was resolved by enhancing state management to prevent malicious webpages from fingerprinting users.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20691 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20691.json"
}
],
"title": "CVE-2026-20691"
},
{
"cve": "CVE-2026-20692",
"notes": [
{
"category": "description",
"text": "A privacy issue affecting user preferences for mail content handling, specifically the \u0027Hide IP Address\u0027 and \u0027Block All Remote Content\u0027 features, was fixed in iOS 26.4, iPadOS 26.4, and various macOS versions.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20692 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20692.json"
}
],
"title": "CVE-2026-20692"
},
{
"cve": "CVE-2026-20698",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4 could allow an app to cause unexpected system termination or kernel memory corruption, which was resolved through improved memory management.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-20698 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-20698.json"
}
],
"title": "CVE-2026-20698"
},
{
"cve": "CVE-2026-28822",
"notes": [
{
"category": "description",
"text": "A type confusion vulnerability related to memory handling in multiple Apple operating systems could allow an attacker to cause unexpected application termination.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28822 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28822.json"
}
],
"title": "CVE-2026-28822"
},
{
"cve": "CVE-2026-28833",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to enumerate a user\u2019s installed applications was fixed by implementing additional restrictions in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28833 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28833.json"
}
],
"title": "CVE-2026-28833"
},
{
"cve": "CVE-2026-28852",
"notes": [
{
"category": "description",
"text": "A stack overflow vulnerability allowing denial-of-service was fixed by improving input validation across multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28852 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28852.json"
}
],
"title": "CVE-2026-28852"
},
{
"cve": "CVE-2026-28856",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability allowing physical attackers to access sensitive user information on locked devices was fixed in iOS 26.4, iPadOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28856 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28856.json"
}
],
"title": "CVE-2026-28856"
},
{
"cve": "CVE-2026-28857",
"notes": [
{
"category": "description",
"text": "Improved memory handling in Safari 26.4, iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, and visionOS 26.4 fixed an issue where processing maliciously crafted web content could cause unexpected process crashes.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28857 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28857.json"
}
],
"title": "CVE-2026-28857"
},
{
"cve": "CVE-2026-28858",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by improved bounds checking to prevent remote system termination or kernel memory corruption.",
"title": "Summary"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28858 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28858.json"
}
],
"title": "CVE-2026-28858"
},
{
"cve": "CVE-2026-28859",
"notes": [
{
"category": "description",
"text": "A memory handling vulnerability in Safari 26.4 and related OS versions was fixed, preventing malicious websites from processing restricted web content outside the sandbox environment.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28859 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28859.json"
}
],
"title": "CVE-2026-28859"
},
{
"cve": "CVE-2026-28861",
"notes": [
{
"category": "description",
"text": "A logic issue in state management was fixed across multiple Apple operating systems to prevent malicious websites from accessing script message handlers intended for other origins.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28861 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28861.json"
}
],
"title": "CVE-2026-28861"
},
{
"cve": "CVE-2026-28863",
"notes": [
{
"category": "description",
"text": "A permissions issue allowing apps to fingerprint users was fixed by adding restrictions in iOS 26.4, iPadOS 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28863 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28863.json"
}
],
"title": "CVE-2026-28863"
},
{
"cve": "CVE-2026-28864",
"notes": [
{
"category": "description",
"text": "Apple addressed a vulnerability in iOS, iPadOS, macOS, visionOS, and watchOS by enhancing permissions checks to prevent local attackers from accessing users\u0027 Keychain items.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28864 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28864.json"
}
],
"title": "CVE-2026-28864"
},
{
"cve": "CVE-2026-28865",
"notes": [
{
"category": "description",
"text": "An authentication vulnerability in multiple Apple operating systems was addressed by improving state management to prevent attackers in privileged network positions from intercepting network traffic.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28865 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28865.json"
}
],
"title": "CVE-2026-28865"
},
{
"cve": "CVE-2026-28866",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, iOS 26.4, iPadOS 26.4, and various macOS versions addressed a vulnerability where improper symlink validation allowed apps to access sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28866 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28866.json"
}
],
"title": "CVE-2026-28866"
},
{
"cve": "CVE-2026-28867",
"notes": [
{
"category": "description",
"text": "A vulnerability allowing apps to potentially leak sensitive kernel state was fixed through improved authentication in multiple Apple operating systems including iOS 18.7.7, iPadOS 18.7.7, and macOS Sequoia 15.7.5.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28867 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28867.json"
}
],
"title": "CVE-2026-28867"
},
{
"cve": "CVE-2026-28868",
"notes": [
{
"category": "description",
"text": "A logging issue in multiple Apple operating systems including iOS, iPadOS, macOS, visionOS, and watchOS was fixed by improving data redaction to prevent apps from disclosing kernel memory.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28868 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28868.json"
}
],
"title": "CVE-2026-28868"
},
{
"cve": "CVE-2026-28870",
"notes": [
{
"category": "description",
"text": "An information leakage vulnerability allowing unauthorized access to sensitive user data was fixed through additional validation in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28870 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28870.json"
}
],
"title": "CVE-2026-28870"
},
{
"cve": "CVE-2026-28871",
"notes": [
{
"category": "description",
"text": "A logic issue in Safari, iOS, iPadOS, and macOS was fixed through improved checks to prevent cross-site scripting attacks from malicious websites.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:L/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28871 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28871.json"
}
],
"title": "CVE-2026-28871"
},
{
"cve": "CVE-2026-28874",
"notes": [
{
"category": "description",
"text": "iOS 26.4 and iPadOS 26.4 addressed an issue where improved validation checks prevent remote attackers from causing unexpected app termination.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28874 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28874.json"
}
],
"title": "CVE-2026-28874"
},
{
"cve": "CVE-2026-28875",
"notes": [
{
"category": "description",
"text": "A buffer overflow vulnerability in iOS 26.4 and iPadOS 26.4 was fixed by implementing improved bounds checking to prevent remote denial-of-service attacks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28875 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28875.json"
}
],
"title": "CVE-2026-28875"
},
{
"cve": "CVE-2026-28876",
"notes": [
{
"category": "description",
"text": "A parsing issue in directory path handling was fixed by improving path validation across multiple OS versions to prevent unauthorized app access to sensitive user data.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28876 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28876.json"
}
],
"title": "CVE-2026-28876"
},
{
"cve": "CVE-2026-28877",
"notes": [
{
"category": "description",
"text": "An authorization vulnerability allowing apps to potentially access sensitive user data was resolved by enhancing state management in iOS 26.4, iPadOS 26.4, macOS Sequoia 15.7.5, macOS Tahoe 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28877 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28877.json"
}
],
"title": "CVE-2026-28877"
},
{
"cve": "CVE-2026-28878",
"notes": [
{
"category": "description",
"text": "Apple addressed a privacy vulnerability that allowed apps to enumerate installed applications by removing sensitive data in updates to iOS 18.7.7, iPadOS 18.7.7, macOS Sonoma 14.8.5, and other operating systems.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28878 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28878.json"
}
],
"title": "CVE-2026-28878"
},
{
"cve": "CVE-2026-28879",
"notes": [
{
"category": "description",
"text": "A use-after-free vulnerability causing potential process crashes when handling malicious web content was fixed through improved memory management in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28879 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28879.json"
}
],
"title": "CVE-2026-28879"
},
{
"cve": "CVE-2026-28880",
"notes": [
{
"category": "description",
"text": "Multiple Apple operating systems including iOS, iPadOS, macOS, and visionOS addressed a permissions issue by implementing additional restrictions to prevent apps from enumerating a user\u2019s installed applications.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28880 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28880.json"
}
],
"title": "CVE-2026-28880"
},
{
"cve": "CVE-2026-28882",
"notes": [
{
"category": "description",
"text": "An issue allowing apps to enumerate a user\u0027s installed applications was resolved through enhanced verification mechanisms in iOS 26.4, iPadOS 26.4, macOS Tahoe 26.4, tvOS 26.4, visionOS 26.4, and watchOS 26.4.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28882 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28882.json"
}
],
"title": "CVE-2026-28882"
},
{
"cve": "CVE-2026-28886",
"notes": [
{
"category": "description",
"text": "A null pointer dereference vulnerability allowing a privileged network user to cause denial-of-service was fixed via improved input validation in multiple Apple operating systems including iOS, iPadOS, macOS, tvOS, visionOS, and watchOS.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:P/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28886 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28886.json"
}
],
"title": "CVE-2026-28886"
},
{
"cve": "CVE-2026-28894",
"notes": [
{
"category": "description",
"text": "A denial-of-service vulnerability in iOS 26.4, iPadOS 26.4, and multiple macOS versions was addressed by improved input validation to prevent remote attackers from causing service disruptions.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28894 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28894.json"
}
],
"title": "CVE-2026-28894"
},
{
"cve": "CVE-2026-28895",
"notes": [
{
"category": "description",
"text": "iOS and iPadOS 16.4 fixed a vulnerability allowing attackers with physical access to bypass biometrics-gated Protected Apps by using the passcode on devices with Stolen Device Protection enabled through improved verification checks.",
"title": "Summary"
},
{
"category": "general",
"text": "CVSS:4.0/AV:P/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N",
"title": "CVSSV4"
}
],
"product_status": {
"known_affected": [
"CSAFPID-1",
"CSAFPID-2"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2026-28895 | NCSC-NL Website",
"url": "https://vulnerabilities.ncsc.nl/csaf/v2/2026/cve-2026-28895.json"
}
],
"title": "CVE-2026-28895"
}
]
}
FKIE_CVE-2025-64505
Vulnerability from fkie_nvd - Published: 2025-11-25 00:15 - Updated: 2025-11-26 18:28| URL | Tags | ||
|---|---|---|---|
| security-advisories@github.com | https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37 | Patch | |
| security-advisories@github.com | https://github.com/pnggroup/libpng/pull/748 | Issue Tracking | |
| security-advisories@github.com | https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42 | Vendor Advisory |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:libpng:libpng:*:*:*:*:*:*:*:*",
"matchCriteriaId": "A8B5D980-7DA8-4291-8723-4CDDF73B19F6",
"versionEndExcluding": "1.6.51",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "LIBPNG is a reference library for use in applications that read, create, and manipulate PNG (Portable Network Graphics) raster image files. Prior to version 1.6.51, a heap buffer over-read vulnerability exists in libpng\u0027s png_do_quantize function when processing PNG files with malformed palette indices. The vulnerability occurs when palette_lookup array bounds are not validated against externally-supplied image data, allowing an attacker to craft a PNG file with out-of-range palette indices that trigger out-of-bounds memory access. This issue has been patched in version 1.6.51."
}
],
"id": "CVE-2025-64505",
"lastModified": "2025-11-26T18:28:32.220",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 1.8,
"impactScore": 4.2,
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
},
"published": "2025-11-25T00:15:47.133",
"references": [
{
"source": "security-advisories@github.com",
"tags": [
"Patch"
],
"url": "https://github.com/pnggroup/libpng/commit/6a528eb5fd0dd7f6de1c39d30de0e41473431c37"
},
{
"source": "security-advisories@github.com",
"tags": [
"Issue Tracking"
],
"url": "https://github.com/pnggroup/libpng/pull/748"
},
{
"source": "security-advisories@github.com",
"tags": [
"Vendor Advisory"
],
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42"
}
],
"sourceIdentifier": "security-advisories@github.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-125"
}
],
"source": "security-advisories@github.com",
"type": "Secondary"
}
]
}
MSRC_CVE-2025-64505
Vulnerability from csaf_microsoft - Published: 2025-11-02 00:00 - Updated: 2025-12-03 01:38| URL | Category | |
|---|---|---|
{
"document": {
"category": "csaf_vex",
"csaf_version": "2.0",
"distribution": {
"text": "Public",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en-US",
"notes": [
{
"category": "general",
"text": "To determine the support lifecycle for your software, see the Microsoft Support Lifecycle: https://support.microsoft.com/lifecycle",
"title": "Additional Resources"
},
{
"category": "legal_disclaimer",
"text": "The information provided in the Microsoft Knowledge Base is provided \\\"as is\\\" without warranty of any kind. Microsoft disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall Microsoft Corporation or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if Microsoft Corporation or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.",
"title": "Disclaimer"
}
],
"publisher": {
"category": "vendor",
"contact_details": "secure@microsoft.com",
"name": "Microsoft Security Response Center",
"namespace": "https://msrc.microsoft.com"
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-64505.json"
},
{
"category": "external",
"summary": "Microsoft Support Lifecycle",
"url": "https://support.microsoft.com/lifecycle"
},
{
"category": "external",
"summary": "Common Vulnerability Scoring System",
"url": "https://www.first.org/cvss"
}
],
"title": "LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index",
"tracking": {
"current_release_date": "2025-12-03T01:38:21.000Z",
"generator": {
"date": "2025-12-03T22:59:15.060Z",
"engine": {
"name": "MSRC Generator",
"version": "1.0"
}
},
"id": "msrc_CVE-2025-64505",
"initial_release_date": "2025-11-02T00:00:00.000Z",
"revision_history": [
{
"date": "2025-11-26T01:01:55.000Z",
"legacy_version": "1",
"number": "1",
"summary": "Information published."
},
{
"date": "2025-11-27T01:04:40.000Z",
"legacy_version": "2",
"number": "2",
"summary": "Information published."
},
{
"date": "2025-12-02T01:40:16.000Z",
"legacy_version": "3",
"number": "3",
"summary": "Information published."
},
{
"date": "2025-12-03T01:38:21.000Z",
"legacy_version": "4",
"number": "4",
"summary": "Information published."
}
],
"status": "final",
"version": "4"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_version",
"name": "2.0",
"product": {
"name": "CBL Mariner 2.0",
"product_id": "17086"
}
},
{
"category": "product_version",
"name": "3.0",
"product": {
"name": "Azure Linux 3.0",
"product_id": "17084"
}
}
],
"category": "product_name",
"name": "Azure Linux"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cazl3 libpng 1.6.40-1",
"product": {
"name": "\u003cazl3 libpng 1.6.40-1",
"product_id": "1"
}
},
{
"category": "product_version",
"name": "azl3 libpng 1.6.40-1",
"product": {
"name": "azl3 libpng 1.6.40-1",
"product_id": "20674"
}
},
{
"category": "product_version_range",
"name": "\u003ccbl2 libpng 1.6.39-1",
"product": {
"name": "\u003ccbl2 libpng 1.6.39-1",
"product_id": "5"
}
},
{
"category": "product_version",
"name": "cbl2 libpng 1.6.39-1",
"product": {
"name": "cbl2 libpng 1.6.39-1",
"product_id": "18435"
}
}
],
"category": "product_name",
"name": "libpng"
},
{
"category": "product_name",
"name": "cbl2 qt5-qtbase 5.12.11-18",
"product": {
"name": "cbl2 qt5-qtbase 5.12.11-18",
"product_id": "2"
}
},
{
"category": "product_name",
"name": "cbl2 syslinux 6.04-10",
"product": {
"name": "cbl2 syslinux 6.04-10",
"product_id": "6"
}
},
{
"category": "product_name",
"name": "cbl2 tensorflow 2.11.1-2",
"product": {
"name": "cbl2 tensorflow 2.11.1-2",
"product_id": "3"
}
},
{
"category": "product_name",
"name": "azl3 qtbase 6.6.3-4",
"product": {
"name": "azl3 qtbase 6.6.3-4",
"product_id": "4"
}
},
{
"category": "product_name",
"name": "azl3 syslinux 6.04-11",
"product": {
"name": "azl3 syslinux 6.04-11",
"product_id": "8"
}
},
{
"category": "product_name",
"name": "azl3 tensorflow 2.16.1-9",
"product": {
"name": "azl3 tensorflow 2.16.1-9",
"product_id": "7"
}
}
],
"category": "vendor",
"name": "Microsoft"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 qt5-qtbase 5.12.11-18 as a component of CBL Mariner 2.0",
"product_id": "17086-2"
},
"product_reference": "2",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 syslinux 6.04-10 as a component of CBL Mariner 2.0",
"product_id": "17086-6"
},
"product_reference": "6",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 tensorflow 2.11.1-2 as a component of CBL Mariner 2.0",
"product_id": "17086-3"
},
"product_reference": "3",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003cazl3 libpng 1.6.40-1 as a component of Azure Linux 3.0",
"product_id": "17084-1"
},
"product_reference": "1",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 libpng 1.6.40-1 as a component of Azure Linux 3.0",
"product_id": "20674-17084"
},
"product_reference": "20674",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 qtbase 6.6.3-4 as a component of Azure Linux 3.0",
"product_id": "17084-4"
},
"product_reference": "4",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 syslinux 6.04-11 as a component of Azure Linux 3.0",
"product_id": "17084-8"
},
"product_reference": "8",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "azl3 tensorflow 2.16.1-9 as a component of Azure Linux 3.0",
"product_id": "17084-7"
},
"product_reference": "7",
"relates_to_product_reference": "17084"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "\u003ccbl2 libpng 1.6.39-1 as a component of CBL Mariner 2.0",
"product_id": "17086-5"
},
"product_reference": "5",
"relates_to_product_reference": "17086"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "cbl2 libpng 1.6.39-1 as a component of CBL Mariner 2.0",
"product_id": "18435-17086"
},
"product_reference": "18435",
"relates_to_product_reference": "17086"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"cwe": {
"id": "CWE-125",
"name": "Out-of-bounds Read"
},
"flags": [
{
"label": "component_not_present",
"product_ids": [
"17086-2",
"17086-6",
"17086-3",
"17084-4",
"17084-8",
"17084-7"
]
}
],
"notes": [
{
"category": "general",
"text": "GitHub_M",
"title": "Assigning CNA"
}
],
"product_status": {
"fixed": [
"20674-17084",
"18435-17086"
],
"known_affected": [
"17084-1",
"17086-5"
],
"known_not_affected": [
"17086-2",
"17086-6",
"17086-3",
"17084-4",
"17084-8",
"17084-7"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-64505 LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index - VEX",
"url": "https://msrc.microsoft.com/csaf/vex/2025/msrc_cve-2025-64505.json"
}
],
"remediations": [
{
"category": "vendor_fix",
"date": "2025-11-26T01:01:55.000Z",
"details": "1.6.51-1:Security Update:https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade",
"product_ids": [
"17084-1",
"17086-5"
],
"url": "https://learn.microsoft.com/en-us/azure/azure-linux/tutorial-azure-linux-upgrade"
}
],
"scores": [
{
"cvss_v3": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"environmentalsScore": 0.0,
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"temporalScore": 6.1,
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:H",
"version": "3.1"
},
"products": [
"17084-1",
"17086-5"
]
}
],
"title": "LIBPNG is vulnerable to a heap buffer overflow in `png_do_quantize` via malformed palette index"
}
]
}
WID-SEC-W-2025-2663
Vulnerability from csaf_certbund - Published: 2025-11-23 23:00 - Updated: 2026-01-28 23:00| URL | Category | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
{
"document": {
"aggregate_severity": {
"text": "mittel"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "Die libpng ist die offizielle Referenzbibliothek f\u00fcr die Darstellung und Manipulation von Bildern im Portable Network Graphics (PNG) Format.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter, anonymer Angreifer kann mehrere Schwachstellen in libpng ausnutzen, um einen Denial of Service Angriff durchzuf\u00fchren und Code auszuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Linux\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-2663 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-2663.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-2663 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-2663"
},
{
"category": "external",
"summary": "libpng Release 1.6.51 vom 2025-11-23",
"url": "https://github.com/pnggroup/libpng/releases/tag/v1.6.51"
},
{
"category": "external",
"summary": "oss-sec mailing list archives vom 2025-11-23",
"url": "https://seclists.org/oss-sec/2025/q4/204"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-4952-h5wq-4m42 vom 2025-11-23",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-4952-h5wq-4m42"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-QPR4-XM66-HWW6 vom 2025-11-23",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-qpr4-xm66-hww6"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-HFC7-PH9C-WCWW vom 2025-11-23",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-hfc7-ph9c-wcww"
},
{
"category": "external",
"summary": "GitHub Security Advisory GHSA-7WV6-48J4-HJ3G vom 2025-11-23",
"url": "https://github.com/pnggroup/libpng/security/advisories/GHSA-7wv6-48j4-hj3g"
},
{
"category": "external",
"summary": "PoC CVE-2025-65018 vom 2025-11-23",
"url": "https://github.com/Neo-Neo6/CVE-2025-65018-Heap-buffer-overflow-in-libpng-ps4-ps5-"
},
{
"category": "external",
"summary": "Gentoo Linux Security Advisory GLSA-202511-06 vom 2025-11-26",
"url": "https://security.gentoo.org/glsa/202511-06"
},
{
"category": "external",
"summary": "Debian Security Advisory DLA-4396 vom 2025-12-07",
"url": "https://lists.debian.org/debian-lts-announce/2025/12/msg00007.html"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2025:15797-1 vom 2025-12-05",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/6VHJB7BZAUFZBE64B7ADJSGFVT67JY7Q/"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3091 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3091.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2FIREFOX-2025-048 vom 2025-12-08",
"url": "https://alas.aws.amazon.com/AL2/ALAS2FIREFOX-2025-048.html"
},
{
"category": "external",
"summary": "Debian Security Advisory DSA-6076 vom 2025-12-10",
"url": "https://lists.debian.org/debian-security-announce/2025/msg00242.html"
},
{
"category": "external",
"summary": "Ubuntu Security Notice USN-7924-1 vom 2025-12-11",
"url": "https://ubuntu.com/security/notices/USN-7924-1"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-DA6D092209 vom 2025-12-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-da6d092209"
},
{
"category": "external",
"summary": "Fedora Security Advisory FEDORA-2025-DBD70402F4 vom 2025-12-13",
"url": "https://bodhi.fedoraproject.org/updates/FEDORA-2025-dbd70402f4"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4383-1 vom 2025-12-12",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023535.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4432-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023583.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4436-1 vom 2025-12-17",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023579.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21220-1 vom 2025-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023591.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:21217-1 vom 2025-12-18",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023593.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4494-1 vom 2025-12-19",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/ZIBH6F5GJDUMZIKK5ICPKWLWOR4CCVQK/"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2025:4533-1 vom 2025-12-30",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2025-December/023661.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3113 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3113.html"
},
{
"category": "external",
"summary": "Amazon Linux Security Advisory ALAS2-2025-3112 vom 2026-01-05",
"url": "https://alas.aws.amazon.com/AL2/ALAS2-2025-3112.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0125 vom 2026-01-06",
"url": "https://access.redhat.com/errata/RHSA-2026:0125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0212 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0212"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0125 vom 2026-01-07",
"url": "https://errata.build.resf.org/RLSA-2026:0125"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0216 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0216"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0211 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0211"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0241 vom 2026-01-08",
"url": "https://linux.oracle.com/errata/ELSA-2026-0241.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0234 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0234"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0238 vom 2026-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2026-0238.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0241 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0241"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0237 vom 2026-01-07",
"url": "https://linux.oracle.com/errata/ELSA-2026-0237.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0125 vom 2026-01-08",
"url": "https://linux.oracle.com/errata/ELSA-2026-0125.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0237 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0237"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0251 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0251"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0210 vom 2026-01-08",
"url": "https://access.redhat.com/errata/RHSA-2026:0210"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0238 vom 2026-01-07",
"url": "https://access.redhat.com/errata/RHSA-2026:0238"
},
{
"category": "external",
"summary": "PoC auf GitHub vom 2026-01-07",
"url": "https://github.com/dantsco/CVE-2025-64720-PoC"
},
{
"category": "external",
"summary": "GitLab Patch Release: 18.7.1, 18.6.3, 18.5.5",
"url": "https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0322 vom 2026-01-08",
"url": "https://access.redhat.com/errata/RHSA-2026:0322"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0323 vom 2026-01-08",
"url": "https://access.redhat.com/errata/RHSA-2026:0323"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0321 vom 2026-01-08",
"url": "https://access.redhat.com/errata/RHSA-2026:0321"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0313 vom 2026-01-08",
"url": "https://access.redhat.com/errata/RHSA-2026:0313"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0414 vom 2026-01-09",
"url": "https://access.redhat.com/errata/RHSA-2026:0414"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0241 vom 2026-01-09",
"url": "https://errata.build.resf.org/RLSA-2026:0241"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0237 vom 2026-01-09",
"url": "https://errata.build.resf.org/RLSA-2026:0237"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0238 vom 2026-01-09",
"url": "https://errata.build.resf.org/RLSA-2026:0238"
},
{
"category": "external",
"summary": "openSUSE Security Update OPENSUSE-SU-2026:20017-1 vom 2026-01-13",
"url": "https://lists.opensuse.org/archives/list/security-announce@lists.opensuse.org/thread/2GPCRBHJC7Z4H55G47GJBQKP5HYHTLXK/"
},
{
"category": "external",
"summary": "Meinberg Security Advisory vom 2026-01-13",
"url": "https://www.meinberg.de/german/news/meinberg-security-advisory-mbgsa-2026-01-lantime-firmware-v7-10-007.htm"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20073-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023744.html"
},
{
"category": "external",
"summary": "SUSE Security Update SUSE-SU-2026:20030-1 vom 2026-01-15",
"url": "https://lists.suse.com/pipermail/sle-security-updates/2026-January/023774.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0927 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0927"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0848 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0848"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0847 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0847"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0849 vom 2026-01-21",
"url": "https://access.redhat.com/errata/RHSA-2026:0849"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0950 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0950"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0928 vom 2026-01-22",
"url": "https://access.redhat.com/errata/RHSA-2026:0928"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0927 vom 2026-01-22",
"url": "https://linux.oracle.com/errata/ELSA-2026-0927.html"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0927 vom 2026-01-23",
"url": "https://errata.build.resf.org/RLSA-2026:0927"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0928 vom 2026-01-23",
"url": "https://errata.build.resf.org/RLSA-2026:0928"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0251 vom 2026-01-23",
"url": "http://linux.oracle.com/errata/ELSA-2026-0251.html"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0928 vom 2026-01-23",
"url": "http://linux.oracle.com/errata/ELSA-2026-0928.html"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0899 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0899"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0932 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0932"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0933 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0933"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0901 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0901"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0895 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0895"
},
{
"category": "external",
"summary": "Red Hat Security Advisory RHSA-2026:0897 vom 2026-01-26",
"url": "https://access.redhat.com/errata/RHSA-2026:0897"
},
{
"category": "external",
"summary": "Rocky Linux Security Advisory RLSA-2026:0932 vom 2026-01-27",
"url": "https://errata.build.resf.org/RLSA-2026:0932"
},
{
"category": "external",
"summary": "Oracle Linux Security Advisory ELSA-2026-0932 vom 2026-01-27",
"url": "https://linux.oracle.com/errata/ELSA-2026-0932.html"
},
{
"category": "external",
"summary": "IBM Security Bulletin 7258234 vom 2026-01-28",
"url": "https://www.ibm.com/support/pages/node/7258234"
}
],
"source_lang": "en-US",
"title": "libpng: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2026-01-28T23:00:00.000+00:00",
"generator": {
"date": "2026-01-29T08:27:34.437+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.5.0"
}
},
"id": "WID-SEC-W-2025-2663",
"initial_release_date": "2025-11-23T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-11-23T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-11-24T23:00:00.000+00:00",
"number": "2",
"summary": "Referenz(en) aufgenommen: EUVD-2025-199236, EUVD-2025-199237, EUVD-2025-199238, EUVD-2025-199239"
},
{
"date": "2025-11-25T23:00:00.000+00:00",
"number": "3",
"summary": "Neue Updates von Gentoo aufgenommen"
},
{
"date": "2025-12-07T23:00:00.000+00:00",
"number": "4",
"summary": "Neue Updates von Debian und openSUSE aufgenommen"
},
{
"date": "2025-12-08T23:00:00.000+00:00",
"number": "5",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2025-12-09T23:00:00.000+00:00",
"number": "6",
"summary": "Neue Updates von Debian aufgenommen"
},
{
"date": "2025-12-10T23:00:00.000+00:00",
"number": "7",
"summary": "Neue Updates von Ubuntu aufgenommen"
},
{
"date": "2025-12-14T23:00:00.000+00:00",
"number": "8",
"summary": "Neue Updates von Fedora und SUSE aufgenommen"
},
{
"date": "2025-12-17T23:00:00.000+00:00",
"number": "9",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-18T23:00:00.000+00:00",
"number": "10",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-21T23:00:00.000+00:00",
"number": "11",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2025-12-29T23:00:00.000+00:00",
"number": "12",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-05T23:00:00.000+00:00",
"number": "13",
"summary": "Neue Updates von Amazon aufgenommen"
},
{
"date": "2026-01-06T23:00:00.000+00:00",
"number": "14",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-07T23:00:00.000+00:00",
"number": "15",
"summary": "Neue Updates von Red Hat und Oracle Linux und PoC aufgenommen"
},
{
"date": "2026-01-08T23:00:00.000+00:00",
"number": "16",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-13T23:00:00.000+00:00",
"number": "17",
"summary": "Neue Updates von openSUSE aufgenommen"
},
{
"date": "2026-01-14T23:00:00.000+00:00",
"number": "18",
"summary": "Neue Updates von SUSE aufgenommen"
},
{
"date": "2026-01-21T23:00:00.000+00:00",
"number": "19",
"summary": "Neue Updates von Red Hat aufgenommen"
},
{
"date": "2026-01-22T23:00:00.000+00:00",
"number": "20",
"summary": "Neue Updates von Red Hat und Oracle Linux aufgenommen"
},
{
"date": "2026-01-25T23:00:00.000+00:00",
"number": "21",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-26T23:00:00.000+00:00",
"number": "22",
"summary": "Neue Updates von Red Hat und Rocky Enterprise Software Foundation aufgenommen"
},
{
"date": "2026-01-27T23:00:00.000+00:00",
"number": "23",
"summary": "Neue Updates von Oracle Linux aufgenommen"
},
{
"date": "2026-01-28T23:00:00.000+00:00",
"number": "24",
"summary": "Neue Updates von IBM aufgenommen"
}
],
"status": "final",
"version": "24"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Amazon Linux 2",
"product": {
"name": "Amazon Linux 2",
"product_id": "398363",
"product_identification_helper": {
"cpe": "cpe:/o:amazon:linux_2:-"
}
}
}
],
"category": "vendor",
"name": "Amazon"
},
{
"branches": [
{
"category": "product_name",
"name": "Debian Linux",
"product": {
"name": "Debian Linux",
"product_id": "2951",
"product_identification_helper": {
"cpe": "cpe:/o:debian:debian_linux:-"
}
}
}
],
"category": "vendor",
"name": "Debian"
},
{
"branches": [
{
"category": "product_name",
"name": "Fedora Linux",
"product": {
"name": "Fedora Linux",
"product_id": "74185",
"product_identification_helper": {
"cpe": "cpe:/o:fedoraproject:fedora:-"
}
}
}
],
"category": "vendor",
"name": "Fedora"
},
{
"branches": [
{
"category": "product_name",
"name": "Gentoo Linux",
"product": {
"name": "Gentoo Linux",
"product_id": "T012167",
"product_identification_helper": {
"cpe": "cpe:/o:gentoo:linux:-"
}
}
}
],
"category": "vendor",
"name": "Gentoo"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c7.5.0 UP14 IF04",
"product": {
"name": "IBM QRadar SIEM \u003c7.5.0 UP14 IF04",
"product_id": "T050392"
}
},
{
"category": "product_version",
"name": "7.5.0 UP14 IF04",
"product": {
"name": "IBM QRadar SIEM 7.5.0 UP14 IF04",
"product_id": "T050392-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:ibm:qradar_siem:7.5.0_up14_if04"
}
}
}
],
"category": "product_name",
"name": "QRadar SIEM"
}
],
"category": "vendor",
"name": "IBM"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cV7.10.007",
"product": {
"name": "Meinberg LANTIME \u003cV7.10.007",
"product_id": "T049952"
}
},
{
"category": "product_version",
"name": "V7.10.007",
"product": {
"name": "Meinberg LANTIME V7.10.007",
"product_id": "T049952-fixed",
"product_identification_helper": {
"cpe": "cpe:/h:meinberg:lantime:v7.10.007"
}
}
}
],
"category": "product_name",
"name": "LANTIME"
}
],
"category": "vendor",
"name": "Meinberg"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c18.7.1",
"product": {
"name": "Open Source GitLab \u003c18.7.1",
"product_id": "T049757"
}
},
{
"category": "product_version",
"name": "18.7.1",
"product": {
"name": "Open Source GitLab 18.7.1",
"product_id": "T049757-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:18.7.1"
}
}
},
{
"category": "product_version_range",
"name": "\u003c18.6.3",
"product": {
"name": "Open Source GitLab \u003c18.6.3",
"product_id": "T049758"
}
},
{
"category": "product_version",
"name": "18.6.3",
"product": {
"name": "Open Source GitLab 18.6.3",
"product_id": "T049758-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:18.6.3"
}
}
},
{
"category": "product_version_range",
"name": "\u003c18.5.5",
"product": {
"name": "Open Source GitLab \u003c18.5.5",
"product_id": "T049759"
}
},
{
"category": "product_version",
"name": "18.5.5",
"product": {
"name": "Open Source GitLab 18.5.5",
"product_id": "T049759-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:gitlab:gitlab:18.5.5"
}
}
}
],
"category": "product_name",
"name": "GitLab"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c1.6.51",
"product": {
"name": "Open Source libpng \u003c1.6.51",
"product_id": "T048833"
}
},
{
"category": "product_version",
"name": "1.6.51",
"product": {
"name": "Open Source libpng 1.6.51",
"product_id": "T048833-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:libpng:libpng:1.6.51"
}
}
}
],
"category": "product_name",
"name": "libpng"
}
],
"category": "vendor",
"name": "Open Source"
},
{
"branches": [
{
"category": "product_name",
"name": "Oracle Linux",
"product": {
"name": "Oracle Linux",
"product_id": "T004914",
"product_identification_helper": {
"cpe": "cpe:/o:oracle:linux:-"
}
}
}
],
"category": "vendor",
"name": "Oracle"
},
{
"branches": [
{
"category": "product_name",
"name": "RESF Rocky Linux",
"product": {
"name": "RESF Rocky Linux",
"product_id": "T032255",
"product_identification_helper": {
"cpe": "cpe:/o:resf:rocky_linux:-"
}
}
}
],
"category": "vendor",
"name": "RESF"
},
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux",
"product": {
"name": "Red Hat Enterprise Linux",
"product_id": "67646",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:-"
}
}
}
],
"category": "vendor",
"name": "Red Hat"
},
{
"branches": [
{
"category": "product_name",
"name": "SUSE Linux",
"product": {
"name": "SUSE Linux",
"product_id": "T002207",
"product_identification_helper": {
"cpe": "cpe:/o:suse:suse_linux:-"
}
}
},
{
"category": "product_name",
"name": "SUSE openSUSE",
"product": {
"name": "SUSE openSUSE",
"product_id": "T027843",
"product_identification_helper": {
"cpe": "cpe:/o:suse:opensuse:-"
}
}
}
],
"category": "vendor",
"name": "SUSE"
},
{
"branches": [
{
"category": "product_name",
"name": "Ubuntu Linux",
"product": {
"name": "Ubuntu Linux",
"product_id": "T000126",
"product_identification_helper": {
"cpe": "cpe:/o:canonical:ubuntu_linux:-"
}
}
}
],
"category": "vendor",
"name": "Ubuntu"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-64505",
"product_status": {
"known_affected": [
"T050392",
"67646",
"T012167",
"T004914",
"T032255",
"74185",
"T049759",
"T049758",
"T048833",
"T049757",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T049952"
]
},
"release_date": "2025-11-23T23:00:00.000+00:00",
"title": "CVE-2025-64505"
},
{
"cve": "CVE-2025-64506",
"product_status": {
"known_affected": [
"T050392",
"67646",
"T012167",
"T004914",
"T032255",
"74185",
"T049759",
"T049758",
"T048833",
"T049757",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T049952"
]
},
"release_date": "2025-11-23T23:00:00.000+00:00",
"title": "CVE-2025-64506"
},
{
"cve": "CVE-2025-64720",
"product_status": {
"known_affected": [
"T050392",
"67646",
"T012167",
"T004914",
"T032255",
"74185",
"T049759",
"T049758",
"T048833",
"T049757",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T049952"
]
},
"release_date": "2025-11-23T23:00:00.000+00:00",
"title": "CVE-2025-64720"
},
{
"cve": "CVE-2025-65018",
"product_status": {
"known_affected": [
"T050392",
"67646",
"T012167",
"T004914",
"T032255",
"74185",
"T049759",
"T049758",
"T048833",
"T049757",
"2951",
"T002207",
"T000126",
"T027843",
"398363",
"T049952"
]
},
"release_date": "2025-11-23T23:00:00.000+00:00",
"title": "CVE-2025-65018"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.